Mastersolution
I have ten years of experience in teaching.
- 3547
- 0
- 17
Community
- Followers
- Following
388 Reviews received
3564 items
CIS430 Unit 8 Self Quiz C17 latest 2017
Question 1
A check digit is a method of detecting incorrectly account numbers that are entered incorrectly.
True
False
Question 2
Tracing is a method used to verify the logical operations executed by a computer.
True
False
Question 3
Generalized audit software packages are owned by the auditor's client.
True
False
Question 4
In parallel simulation a program is created that does what the application program does. Transactions are reprocessed and the parallel simulation results are compared to the...
- Exam (elaborations)
- • 5 pages •
Question 1
A check digit is a method of detecting incorrectly account numbers that are entered incorrectly.
True
False
Question 2
Tracing is a method used to verify the logical operations executed by a computer.
True
False
Question 3
Generalized audit software packages are owned by the auditor's client.
True
False
Question 4
In parallel simulation a program is created that does what the application program does. Transactions are reprocessed and the parallel simulation results are compared to the...
CIS430 Unit 7 Self Quiz C16
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...
- Exam (elaborations)
- • 4 pages •
Question 1
A software program that allows access to a system without going through the normal logon procedures is called back door.
True
False
Question 2
A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse.
True
False
Response Feedback:
It is called a worm.
Question 3
The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems.
True
False
Question 4
Encryption is the conv...
CIS430 Unit 8 Quiz C17 latest 2017
Question 1
A control designed to validate a transaction at the point of data entry is a. recalculation of
a record count.
a check digit.
checkpoints.
recalculation of hash total.
Question 2
Which of the following statements is true?
The black box approach to testing application controls is essentially auditing around the computer.
The white box approach audits through the computer and tests the application logic directly.
Both are true.
Both are false
Question 3
In an automated payroll processin...
- Exam (elaborations)
- • 4 pages •
Question 1
A control designed to validate a transaction at the point of data entry is a. recalculation of
a record count.
a check digit.
checkpoints.
recalculation of hash total.
Question 2
Which of the following statements is true?
The black box approach to testing application controls is essentially auditing around the computer.
The white box approach audits through the computer and tests the application logic directly.
Both are true.
Both are false
Question 3
In an automated payroll processin...
CIS430 Unit 7 Quiz C16 latest 2017
Question 1
In regard to data base backup the auditor’s objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data.
True
False
Question 2
A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of
operating system controls.
data resource controls.
computer center and security contr...
- Exam (elaborations)
- • 3 pages •
Question 1
In regard to data base backup the auditor’s objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data.
True
False
Question 2
A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of
operating system controls.
data resource controls.
computer center and security contr...
CIS430 Unit 7 Quiz C16 Latest 2017
Question 1
In regard to data base backup the auditor's objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data
True
False
Question 2
A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of
operating system controls
data resource controls
computer center and security controls
...
- Exam (elaborations)
- • 3 pages •
Question 1
In regard to data base backup the auditor's objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data
True
False
Question 2
A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of
operating system controls
data resource controls
computer center and security controls
...
CIS430 Unit 7 Quiz C15 Latest 2017
Question 1
Which of the following is not a disaster recovery techniques?
empty shell
Recovery Operations Center (ROC)
internally provided backup
All of the above are disaster recovery techniques
Question 2
2 out of 2 points
Which of the following is NOT a control implication of distributed data processing?
redundancy
user satisfaction
incompatibility
lack of standards
Question 3
When management outsources IT they also are able to outsource their management responsibility under SOX for ensuring a...
- Exam (elaborations)
- • 2 pages •
Question 1
Which of the following is not a disaster recovery techniques?
empty shell
Recovery Operations Center (ROC)
internally provided backup
All of the above are disaster recovery techniques
Question 2
2 out of 2 points
Which of the following is NOT a control implication of distributed data processing?
redundancy
user satisfaction
incompatibility
lack of standards
Question 3
When management outsources IT they also are able to outsource their management responsibility under SOX for ensuring a...
CIS430 Unit 6 Self Quiz C13
Question 1
When implementing a new system, the costs associated with transferring data from one storage medium to another is an example of a data conversion cost.
True
False
Question 2
All of the following are reasons why new systems fail except
The user is not involved in the development of the system.
The system requirements are not clearly specified.
The systems analysts rely on prototyping models.
The systems analyst did not fully understand the business problem.
Question 3
The degree of com...
- Exam (elaborations)
- • 3 pages •
Question 1
When implementing a new system, the costs associated with transferring data from one storage medium to another is an example of a data conversion cost.
True
False
Question 2
All of the following are reasons why new systems fail except
The user is not involved in the development of the system.
The system requirements are not clearly specified.
The systems analysts rely on prototyping models.
The systems analyst did not fully understand the business problem.
Question 3
The degree of com...
CIS430 Unit 6 Quiz C13 latest 2017
Question 1
Which of the following is least likely to be an accountant’s role in the SDLC?
user
consultant
auditor
programmer
all of these are likely roles
Question 2
Which of the following steps is NOT considered to be part of this systems survey?
Interviews are conducted with operating people and managers
The complete documentation of the system is obtained and reviewed
Measures of processing volume are obtained for each operation
Equipment sold by various computer manufacturers is reviewed i...
- Exam (elaborations)
- • 5 pages •
Question 1
Which of the following is least likely to be an accountant’s role in the SDLC?
user
consultant
auditor
programmer
all of these are likely roles
Question 2
Which of the following steps is NOT considered to be part of this systems survey?
Interviews are conducted with operating people and managers
The complete documentation of the system is obtained and reviewed
Measures of processing volume are obtained for each operation
Equipment sold by various computer manufacturers is reviewed i...
CIS430 Unit 6 Quiz C12 latest 2017
Question 1
Which of the following statements is true?
Cookies were originally intended to facilitate advertising on the Web
Cookies always contain encrypted data
encrypted data
Cookies contain the URLs of sites the user visits
Web browsers cannot function without cookies
Question 2
Which of the following security risks associated with electronic commerce is false?
A firewall is a system used to insulate an organization’s intranet from the internet
A common firewall configuration employs two fi...
- Exam (elaborations)
- • 3 pages •
Question 1
Which of the following statements is true?
Cookies were originally intended to facilitate advertising on the Web
Cookies always contain encrypted data
encrypted data
Cookies contain the URLs of sites the user visits
Web browsers cannot function without cookies
Question 2
Which of the following security risks associated with electronic commerce is false?
A firewall is a system used to insulate an organization’s intranet from the internet
A common firewall configuration employs two fi...
CIS430 Unit 5 Self Quiz C12
Question 1
The rules that make it possible for users of networks to communicate are called protocols
True
False
Question 2
EDI is the inter-company exchange of computer processible business information in standard format.
True
False
Question 3
Which one of the following statements is correct?
Cookies always contain encrypted data.
Cookies are text files and never contain encrypted data.
Cookies contain the URLs of sites visited by the user.
Web browsers cannot function without cookies
Question 4...
- Exam (elaborations)
- • 2 pages •
Question 1
The rules that make it possible for users of networks to communicate are called protocols
True
False
Question 2
EDI is the inter-company exchange of computer processible business information in standard format.
True
False
Question 3
Which one of the following statements is correct?
Cookies always contain encrypted data.
Cookies are text files and never contain encrypted data.
Cookies contain the URLs of sites visited by the user.
Web browsers cannot function without cookies
Question 4...
Herzing NU621 Unit 4 Quiz 4 (Advanced Pathophysiology)
REGIS NU646 Week 7 Quiz Latest/REGIS NU646 Week 7 Quiz Latest
Regis NU665 Week 6 Quiz Latest/Regis NU665 Week 6 Quiz Latest
Regis NU664 Week 4 Quiz Latest/Regis NU664 Week 4 Quiz Latest
REGIS NU646 Week 3 Quiz Latest/REGIS NU646 Week 3 Quiz Latest