Chapter 2 Computer Information System (multiple choice) PDF

Title Chapter 2 Computer Information System (multiple choice)
Course ACCOUNTANCY
Institution Our Lady of Fatima University
Pages 3
File Size 97.3 KB
File Type PDF
Total Downloads 58
Total Views 144

Summary

AIS CHAPTER 2 (MULTIPLE CHOICE)...


Description

Computer Information System Chapter 2 Multiple Choice

All of the following are issues of computer security except

b. permitting computer operators

A) releasing incorrect data to authorized ind

unlimited access to the computer room

Segregation of duties in the computer-based information system

separating the programmer from

includes

the computer operator

A) separating the programmer from the compute In a computer-based information system, which of the following

All of the above duties should be

duties needs to be separated?

separated

A) program coding from program operations Participation in system development activities include: A) system analysts, database designers and Adequate backups will protect against all of the following except

b. unauthorized access

A) natural disasters such as fires Which is the most critical segregation of duties in the centralized

systems development from data

computer services function?

processin

A) systems development from data processin Systems development is separated from data processing activities

b. allows programmers access to

because failure to do so

make unauthorized changes to

A) weakens database access security

applications during execution

Which organizational structure is most likely to result in good

a. separate systems development

documentation procedures?

from systems maintenance

A) separate systems development from systems mainten All of the following are control risks associated with the distributed

system interdependency

data processing structure except A) lack of separation of duties Which of the following is not an essential feature of a disaster

b. computer services function

recovery plan? A) off-site storage of backups A cold site backup approach is also known as

c. empty shell

A) internally provided backup The major disadvantage of an empty shell solution as a second site

b. recovery depends on the

backup is

availability of necessary computer

A) the host site may be unwilling to disrupt

hardware

An advantage of a recovery operations center is that

b. the initial recovery period is

A) this is an inexpensive solution

very quick

For most companies, which of the following is the least critical application for disaster recovery purposes? A) month-end adjustments

a. month-end adjustments

The least important item to store off-site in case of an emergency is

d. results of the latest test of the

A) backups of systems software

disaster recovery program

Some companies separate systems analysis from

C. a new systems analyst has

programming/program maintenance. All of the following are control

difficulty in understanding the

weaknesses that may occur with this organizational structure except

logic of the program

A) systems documentation is inadequate because All of the following are recommended features of a fire protection

b. an elaborate water sprinkler

system for a computer center except

system

A) clearly marked exits All of the following tests of controls will provide evidence about the

c. verification of the second site

physical security of the computer center except

backup location

A) review of fire marshal records All of the following tests of controls will provide evidence about the

b. analysis of the fire detection

adequacy of the disaster recovery plan except

system at the primary site

A) inspection of the second site backup The following are examples of commodity assets except

systems development

A) network management Which of the following is true?

Core competency theory argues

A) Core competency theory argues that an organization should

that an organization should focus

outsource specific

exclusively on its core business competencies

Which of the following is not true? A) Large-scale IT outsourcing involves transferring specific assets to

specific assets are of value to

a vendor

vendors because, once acquired, vendors can achieve economies of scale by employing them with other clients

Which of the following is not true?

the SSAE 16 report, which is

A) When management outsources their

prepared by the outsourcer's auditor, attests to the adequacy of the vendor's internal

Which of the following is not true?

c. The SSAE 16 report, which is

A) Management may outsource their organizations' IT functions,

prepared by the outsourcer's auditor, attests to the adequacy of the vendor's internal controls.

Segregation of duties in the computer-based information system

separating the programmer from

includes

the computer operator

A) separating the programmer from the computer operator A disadvantage of distributed data processing is

the potential for hardware and

A) the increased time between job request and job completion

software incompatibility among users...


Similar Free PDFs