logo-home

Mastersolution

I have ten years of experience in teaching.

Community

  • Followers
  • Following

388 Reviews received

3564 items

CIS430 Unit 8 Self Quiz C17 latest 2017

(0)
$15.49
0x  sold

Question 1 A check digit is a method of detecting incorrectly account numbers that are entered incorrectly. True False Question 2 Tracing is a method used to verify the logical operations executed by a computer. True False Question 3 Generalized audit software packages are owned by the auditor's client. True False Question 4 In parallel simulation a program is created that does what the application program does. Transactions are reprocessed and the parallel simulation results are compared to the...

i x
  • Exam (elaborations)
  •  • 5 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 7 Self Quiz C16

(0)
$10.49
0x  sold

Question 1 A software program that allows access to a system without going through the normal logon procedures is called back door. True False Question 2 A software program that replicates itself in areas of idle memory until the system fails is called a trojan horse. True False Response Feedback: It is called a worm. Question 3 The grandfather-parent-child (aka grandfather-father-son) backup technique is most appropriate for sequential batch systems. True False Question 4 Encryption is the conv...

i x
  • Exam (elaborations)
  •  • 4 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 8 Quiz C17 latest 2017

(0)
$10.49
0x  sold

Question 1 A control designed to validate a transaction at the point of data entry is a. recalculation of a record count. a check digit. checkpoints. recalculation of hash total. Question 2 Which of the following statements is true? The black box approach to testing application controls is essentially auditing around the computer. The white box approach audits through the computer and tests the application logic directly. Both are true. Both are false Question 3 In an automated payroll processin...

i x
  • Exam (elaborations)
  •  • 4 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 7 Quiz C16 latest 2017

(0)
$7.49
0x  sold

Question 1 In regard to data base backup the auditor’s objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data. True False Question 2 A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of operating system controls. data resource controls. computer center and security contr...

i x
  • Exam (elaborations)
  •  • 3 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 7 Quiz C16 Latest 2017

(0)
$7.49
0x  sold

Question 1 In regard to data base backup the auditor's objective is to verify that the database controls are adequate to facilitate the recovery of lost, destroyed or corrupted data True False Question 2 A user’s application may consist of several modules stored in separate memory locations, each with its own data. One module must not be allowed to destroy or corrupt another module. This is an objective of operating system controls data resource controls computer center and security controls ...

i x
  • Exam (elaborations)
  •  • 3 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 7 Quiz C15 Latest 2017

(0)
$7.49
0x  sold

Question 1 Which of the following is not a disaster recovery techniques? empty shell Recovery Operations Center (ROC) internally provided backup All of the above are disaster recovery techniques Question 2 2 out of 2 points Which of the following is NOT a control implication of distributed data processing? redundancy user satisfaction incompatibility lack of standards Question 3 When management outsources IT they also are able to outsource their management responsibility under SOX for ensuring a...

i x
  • Exam (elaborations)
  •  • 2 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 6 Self Quiz C13

(0)
$7.49
0x  sold

Question 1 When implementing a new system, the costs associated with transferring data from one storage medium to another is an example of a data conversion cost. True False Question 2 All of the following are reasons why new systems fail except The user is not involved in the development of the system. The system requirements are not clearly specified. The systems analysts rely on prototyping models. The systems analyst did not fully understand the business problem. Question 3 The degree of com...

i x
  • Exam (elaborations)
  •  • 3 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 6 Quiz C13 latest 2017

(0)
$10.49
0x  sold

Question 1 Which of the following is least likely to be an accountant’s role in the SDLC? user consultant auditor programmer all of these are likely roles Question 2 Which of the following steps is NOT considered to be part of this systems survey? Interviews are conducted with operating people and managers The complete documentation of the system is obtained and reviewed Measures of processing volume are obtained for each operation Equipment sold by various computer manufacturers is reviewed i...

i x
  • Exam (elaborations)
  •  • 5 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 6 Quiz C12 latest 2017

(0)
$7.49
1x  sold

Question 1 Which of the following statements is true? Cookies were originally intended to facilitate advertising on the Web Cookies always contain encrypted data encrypted data Cookies contain the URLs of sites the user visits Web browsers cannot function without cookies Question 2 Which of the following security risks associated with electronic commerce is false? A firewall is a system used to insulate an organization’s intranet from the internet A common firewall configuration employs two fi...

i x
  • Exam (elaborations)
  •  • 3 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x

CIS430 Unit 5 Self Quiz C12

(0)
$7.49
0x  sold

Question 1 The rules that make it possible for users of networks to communicate are called protocols True False Question 2 EDI is the inter-company exchange of computer processible business information in standard format. True False Question 3 Which one of the following statements is correct? Cookies always contain encrypted data. Cookies are text files and never contain encrypted data. Cookies contain the URLs of sites visited by the user. Web browsers cannot function without cookies Question 4...

i x
  • Exam (elaborations)
  •  • 2 pages • 
  • by mastersolution • 
  • uploaded  01-03-2018
Quick View
i x