Application Controls Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of simulation in production transaction processing?

  • To test the security of the application
  • To automate the entire transaction processing
  • To document every transaction online
  • To reprocess previously handled transactions and compare results (correct)

Which of the following best describes auditing around the computer?

  • Performing black box testing without looking at application logic (correct)
  • Understanding the internal logic of applications
  • Using advanced programming languages during audits
  • Revising the code directly within the application

How is a validity check classified in data interrogation?

  • Transaction
  • Record
  • Field (correct)
  • File

Which of the following is NOT one of the five major components of a GDIS?

<p>Input procedures (B)</p> Signup and view all the answers

What is the function of run-to-run controls?

<p>To ensure the integrity and order of processed records (C)</p> Signup and view all the answers

What do input controls primarily achieve in transaction processing?

<p>Testing transaction data for errors (B)</p> Signup and view all the answers

Which type of check is defined as a 'Zero-value check'?

<p>Record interrogation (C)</p> Signup and view all the answers

What does a sequence check ensure in data interrogation?

<p>Data entries follow a specified order (A)</p> Signup and view all the answers

Which of the following are not included as groups of application controls?

<p>Input validation controls (C)</p> Signup and view all the answers

What occurs during an addition error in transcription?

<p>An extra digit or character is added to the code. (D)</p> Signup and view all the answers

Which statement correctly describes a check digit?

<p>It detects errors in data coding. (C)</p> Signup and view all the answers

Which of the following describes a single transposition error?

<p>Two digits in a code are reversed. (B)</p> Signup and view all the answers

Which of the following statements about input controls is true?

<p>They prevent errors before data input. (B)</p> Signup and view all the answers

What does a reasonableness check evaluate?

<p>Whether a value is reasonable based on related data. (C)</p> Signup and view all the answers

What is the purpose of source document controls?

<p>To control the documents used to initiate transactions. (A)</p> Signup and view all the answers

Which of these describes what shredding computer printouts represents?

<p>An output control mechanism. (D)</p> Signup and view all the answers

Which method flags errors and places them in an error file during data entry?

<p>Creation of an Error File. (A)</p> Signup and view all the answers

What is indicative of a multiple transposition error?

<p>Nonadjacent digits are reversed. (B)</p> Signup and view all the answers

What method does not require detailed knowledge of program logic when testing applications?

<p>Black box testing (B)</p> Signup and view all the answers

Which of the following is true regarding transcription errors?

<p>They can occur in any data entry process. (B)</p> Signup and view all the answers

Which technique is primarily designed to prevent transcription errors?

<p>Source Document Controls. (B)</p> Signup and view all the answers

What happens when the control total for a data batch does not balance?

<p>The entire batch is rejected and placed in the error file. (A)</p> Signup and view all the answers

What is a significant characteristic of the white box testing approach?

<p>It requires examination of program logic. (C)</p> Signup and view all the answers

Which control would prevent a computer operator from accidentally using the wrong master file?

<p>Header label check (B)</p> Signup and view all the answers

Which error occurs when a digit in a code is replaced with another digit?

<p>Substitution Error. (A)</p> Signup and view all the answers

Run-to-run control totals are used to ensure all except which of the following?

<p>All data input is validated (A)</p> Signup and view all the answers

What method is not used to maintain an audit trail in a computerized environment?

<p>Data encryption (A)</p> Signup and view all the answers

Which risk exposure is associated with printing processes, but does not involve computer criminals?

<p>Using a remote printer and incurring inefficiencies (D)</p> Signup and view all the answers

Which statement about transaction logs is incorrect?

<p>Transaction logs are temporary files (A)</p> Signup and view all the answers

Which of the following is not included in input controls?

<p>Spooling check (D)</p> Signup and view all the answers

Which technique is an example of input error correction?

<p>All are examples (A)</p> Signup and view all the answers

Which of the following statements regarding the integrated test facility (ITF) is false?

<p>ITF is solely for data validation (B)</p> Signup and view all the answers

What is a potential risk associated with output spooling?

<p>Data loss due to improper handling (D)</p> Signup and view all the answers

Which of the following checks verifies that numerical values fall within a specified range?

<p>Range check (D)</p> Signup and view all the answers

What type of fraud harms many victims but affects each only slightly?

<p>Salami fraud (C)</p> Signup and view all the answers

Which input control is designed to ensure that the value entered is of the appropriate type, such as numbers or letters?

<p>Numeric-alphabetic check (D)</p> Signup and view all the answers

What is the purpose of a check digit in data entry?

<p>To verify the entire numeric entry (D)</p> Signup and view all the answers

In auditing, what does the black box approach entail?

<p>Using the software without understanding its operations (A)</p> Signup and view all the answers

What is an example of an exposure risk in report distribution?

<p>Unauthorized access to sensitive reports (C)</p> Signup and view all the answers

What is parallel simulation in auditing?

<p>Auditing by writing a test program to mimic the application (D)</p> Signup and view all the answers

Which of the following is not a characteristic of complex transactions that involve input from many sources?

<p>Simple processing requirements (A)</p> Signup and view all the answers

Which of the following options is a white box testing example?

<p>Validating customer credentials (A), Reconciliating control totals (B), Ensuring compliance with pay rates (D)</p> Signup and view all the answers

When analyzing results from the test data method, which aspect typically requires the least review time?

<p>Transaction records (D)</p> Signup and view all the answers

Which of the following is considered an advantage of the test data technique?

<p>Explicit evidence of functionalities (A), Minimal disruption during testing (C)</p> Signup and view all the answers

Which of the following is an exception among the disadvantages of the test data technique?

<p>Requires minimal computer expertise (C)</p> Signup and view all the answers

What is a fundamental requirement for effective program testing?

<p>Generation of significant test data (C)</p> Signup and view all the answers

Identify the transcription error among the following purchase order number deviations.

<p>124356 (D)</p> Signup and view all the answers

Which statement regarding check digits is not accurate?

<p>They are primarily located at the start of codes. (C)</p> Signup and view all the answers

Flashcards

Test Data Method

A technique used to test an application's logic by inputting specially prepared data and analyzing the results.

White Box Testing

A type of software testing that examines the internal workings of a program, focusing on code structure and logic.

Black Box Testing

A type of software testing that focuses on the functional behavior of a program without looking at the code.

Test Data

Specially prepared data used to test the functionality of a system.

Signup and view all the flashcards

Check Digit

A digit calculated from other digits in a data code to help detect transcription and transposition errors.

Signup and view all the flashcards

Batch Controls

A set of techniques used to ensure the accuracy and completeness of data processed in batches.

Signup and view all the flashcards

Transcription Error

An error that occurs when data is incorrectly copied from one source to another.

Signup and view all the flashcards

Transposition Error

An error that occurs when two adjacent digits are switched in a data code.

Signup and view all the flashcards

Addition Error

An error where an extra digit or character is added to the original data.

Signup and view all the flashcards

Truncation Error

An error where a digit or character is removed from the end of the original data.

Signup and view all the flashcards

Substitution Error

An error where one digit in a code is replaced with another.

Signup and view all the flashcards

Single Transposition Error

An error where two adjacent digits are reversed.

Signup and view all the flashcards

Multiple Transposition Error

An error where non-adjacent digits are transposed.

Signup and view all the flashcards

Data Coding Controls

Methods used to ensure the accuracy of data entered into a system by preventing transcription and transposition errors.

Signup and view all the flashcards

Header Label Check

A control that verifies the correct master file is being used for processing. This ensures that the wrong file is not accidentally used, as in the scenario where the accounts receivable master file was erased due to a wrong file selection.

Signup and view all the flashcards

Run-to-Run Control Totals

A method used to track data throughout processing. These totals monitor data volume and integrity but do not validate individual input values.

Signup and view all the flashcards

Audit Trail

A record of all transactions and system events that helps track data changes and identify discrepancies. This is crucial for accountability and investigation.

Signup and view all the flashcards

Spooling

Creating an intermediate output file before printing. This introduces security risks as the file can be accessed and tampered with.

Signup and view all the flashcards

Transaction Log

A temporary file that records both successful and unsuccessful transactions. This assists in error detection and recovery.

Signup and view all the flashcards

Input Controls

Measures to ensure data accuracy and validity at the point of input. These controls help prevent errors from entering the system.

Signup and view all the flashcards

Input Error Correction Techniques

Methods used to handle errors detected during data input, such as immediate correction, batch rejection, or creation of an error file.

Signup and view all the flashcards

Integrated Test Facility (ITF)

A technique that involves creating test data within a live production system. ITF data is processed alongside real data to test system functionality without affecting production results.

Signup and view all the flashcards

Simulation in Auditing

Reprocessing production transactions to compare the results to the original production run. It's a common technique for auditing and verifying the accuracy of automated processes.

Signup and view all the flashcards

Auditing Around the Computer

Black box testing where auditors don't focus on the application's internal logic. They verify input matches output.

Signup and view all the flashcards

Auditing Through the Computer

Understanding the application's internal logic, including programming components. Vital for highly automated systems with less visible input/output.

Signup and view all the flashcards

Field Interrogation

Checking individual data elements (fields) for errors. Example: A limit check verifies if a field's value stays within a predefined limit.

Signup and view all the flashcards

Record Interrogation

Checks applied to a group of related data fields, forming a record. Example: A sequence check examines the order of entries in a record.

Signup and view all the flashcards

File Interrogation

Controls applied to a collection of records. Example: A version check ensures the correct file version is used.

Signup and view all the flashcards

Generalized Data Input System (GDIS)

A system that standardizes data input validation procedures. It comprises several key components like validation module, validated file, error file, reports, and transaction log.

Signup and view all the flashcards

Run-to-Run Controls

A control device to ensure records are not lost, duplicated, or missed during multiple processing steps. It ensures data consistency across processing.

Signup and view all the flashcards

Application Controls

These controls aim to ensure the accuracy, completeness, and validity of data processed by applications. They are built into the software itself and work in real-time to detect and prevent errors.

Signup and view all the flashcards

Audit Trail Controls

These controls ensure a complete, accurate, and reliable record of all transactions that have been processed. They help auditors trace data back to its origin.

Signup and view all the flashcards

Reasonableness Check

This type of check assesses whether a value in one field is reasonable when considering the data in other fields. It helps identify errors caused by data entry or system malfunctions.

Signup and view all the flashcards

Resubmitting Corrected Records

Processing corrected records can lead to duplicate transactions. Two methods to prevent this: 1. Reverse the effects of partially processed transactions and resubmit corrected records. 2. Reinsert corrected records at the stage where the error was detected.

Signup and view all the flashcards

Output Exposure Examples

Output exposures include situations where output is at risk, for example: output spooling, delayed printing, waste, and report distribution issues.

Signup and view all the flashcards

Numeric-Alphabetic Check

This input control verifies that fields contain the correct data type: numbers or letters.

Signup and view all the flashcards

Limit Check

A limit check verifies that values are within predefined limits.

Signup and view all the flashcards

Range Check

A range check ensures values fall within an acceptable range.

Signup and view all the flashcards

Salami Fraud

A fraud that affects a large number of victims, but each individual suffers small losses.

Signup and view all the flashcards

Study Notes

True/False Questions

  • The three groups of application controls are batch controls, run-to-run controls, and audit trail controls. False.
  • A reasonableness check determines if a value is reasonable in one field when considered along with data in other fields of a record. True.
  • A truncation error is a type of transcription error. True.
  • A check digit is used to detect data coding errors. True.
  • Input controls are designed to detect errors after processing. False.
  • The black box approach allows auditors to explicitly review program logic. False.
  • The black box approach requires detailed knowledge of the program logic being tested. False.
  • A run-to-run control is an example of an output control. False.
  • Shredding computer output is an output control. True.
  • All input controls are implemented after data input. False.
  • Achieving batch control requires grouping similar transactions, such as sales orders, and controlling batches throughout processing. True.
  • The white box tests of program controls are also known as auditing through the computer. True.
  • Incorrectly recording sales order 123456 as 124356 is an example of a transcription error. True.
  • When using the test data method, multiple error messages indicate a flaw in test transactions. True.
  • The base case system evaluation is a variation of the test data method. True.
  • Tracing is a method used to verify logical operations by a computer application. True.
  • Parallel simulation results are compared to production run results to evaluate application quality. True.
  • Input controls use programmed procedures to ensure master file data is free of errors. False.
  • The integrated test facility permits auditors to test applications during normal operation. True.
  • Using an integrated test facility poses no threat to organizational data files. False.
  • Spooling is a form of processing control. False.
  • A salami fraud impacts many victims but with little harm to each. True.

Multiple Choice Questions

  • Which statement is not correct about the audit trail?
    • It traces transactions from their source, though final disposition.
    • It's a function of application program quality.
    • It can be pointers, indexes, or embedded keys.
    • It's not stored sequentially in the audit file. (Incorrect)
  • Which concept is not associated with black box auditing?
    • The application doesn't have to be taken 'offline' during testing.
    • Auditors don't need internal logic knowledge to test.
    • The auditor reconciles previous production outputs with inputs.
    • The approach uses complex transactions which receive inputs from several sources. (Incorrect)
  • Which one is not a white box test?
    • Determining fair value of inventory
    • Verifying passwords are valid
    • Ensuring that pay rates are within a specified range
    • Reconciling control totals. (Incorrect)
  • Analyzing test data, which one receives least attention?
    • The test transactions
    • Error reports
    • Updated master files
    • Output reports (Incorrect)
  • Which of the following is not an advantage of the test data technique?
    • Auditors need little computer skill
    • The method doesn't disrupt operations too much
    • Easily compiled test data
    • The technique requires computer expertise. (Incorrect)
  • Which is false about Program Testing?
    • Individual modules can be tested, not full systems.
    • Meaningful test data is needed.
    • Re-running tests isn't needed after systems have been implemented.
    • The primary concern is usability rather than the system being fully functional. (Incorrect)

Short Answer Questions

  • A firm limits overtime to 10 hours per week. An employee is entered as working 15 hours. Which control detects this error?
    • Limit check.
  • The employee typed "CANARY" when the password was "CANARY." Which control can detect this?
    • Validity check
  • An order entry system allows 10% price variance. An item costs $3, but a cashier enters $2. Which control detects this?
    • Range check
  • Name the three main categories of application controls.
    • Input, processing, and output controls.

Additional Notes

  • Privacy implications of output relate to sensitive information (client data).
  • Processing controls include batch, run-to-run, and audit trails.
  • Errors detected during data processing require careful handling, and data can be re-entered at the input stage. Methods include reversing partially processed transactions and re-entry at the original error point.
  • Output controls protect data from loss, misdirection, or corruption. Risk situations can include delayed printing, waste, report distribution, and more.
  • Input controls include numeric/alphabetic checks (correct character types), limit checks (data within permissible limits), range checks (values within acceptable ranges), reasonableness checks (values are reasonable given other constraints), and validity checks (field values comply with expected values).
  • Check digits detect entered data errors.
  • A parallel simulation is when an auditor's program simulates the application using production data, then comparing results with the original program's output to validate performance.
  • Auditing around the computer involves testing inputs and outputs without examining internal processes, while auditing through the computer necessitates knowledge of internal programming (i.e., knowledge of program logic). This understanding of the internal logic is especially crucial for modern computerized systems.
  • Classification of fields (e.g., limit checks) and records (e.g., reasonableness checks) is critical to understanding data structure and controls.
  • A General Data Input System (GDIS) has components such as a generalized validation module, validated data files, error files, error reports, and transaction logs.
  • Run-to-run controls ensure that no data was lost or processed more than once, during a data process run.
  • SDLC documentation review is necessary to confirm adherence to policies for user authorization, feasibility, detailed analysis of user needs, cost-benefit analysis, appropriate design, comprehensive testing, and evidence of error corrections during the conversion period.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on application controls with this True/False quiz. Each question deals with different types of controls, such as batch and input controls, and their functionalities. Determine whether these statements about application controls are true or false.

More Like This

Use Quizgecko on...
Browser
Browser