Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please I need the answers for 5-6-7-8 a. applicat b.general c. specific d. input

ID: 2548778 • Letter: P

Question


Please I need the answers for 5-6-7-8 a. applicat b.general c. specific d. input e. none of the above 2. A source data control that calculates a separate digit which is added on to codes and account numbers for the purpose of later recalculation and verification is a(n): a, waste of time b. check digit e, edit check d. key verification e none of the above 3. When audit risk isthen auditors must take larger samples of data during the a. control, low b. control, high e. acceptable audit, high d. investing,low e. consumer, low 4. Which of the following will not prodect your personal information while your system i connected to the Internet a firewal b, encryption c laptop proximity alarm d. an anonymous browse e. socure r S. A compuaer operator inadvertently has loaded the wrong CD when updating the inventory file Which of the following is most likely to detect sach an emor? a password centirol procedures h reading internal and exienal labels d physical aocess controls e. encrypton Peroanel policios sach as background checks, mandatory vacations, and rotation of duties will tend to deter ntentional errors h employee fraud c fraud by outsiders d. payroll imegularities e fowensic accounding 7 Which step would be inappropriate in trying to achieve good control over program changes? a formal authorization for program changes b programmers making bug fixes immediately when problems are noted e. sabmission to the supervisor for approval of modifications d. thorough testing of changes before implementation e separation of programming and authorizing changes & A comipany that has procedures for data entry that are not followed has more a company with appropriate procedures that are followed regularly. risk t a control b. detection e. acceptable d. investing

Explanation / Answer

5) A computer operator inadvertently has loaded the wrong CD when updating the inventory file. Likely to detect an error with

Solution: encryption

Explanation: NetIQ input files holds an verification identifier built for preventing from accidentally loading the wrong type of file

6) Personal policies such as background checks, mandatory vacations, and rotation of duties will lend to deter

Solution: employee fraud

Explanation: Personal policies such as background checks, mandatory vacations, and rotation of duties will lend to deter employee fraud or embezzlement

7) Which step would be inappropriate in trying to achieve good control over program changes?

Solution: separation of programming and authority changes

Explanation: separation of programming and authority changes will not be included

8) A company that has procedures for data entry that are not followed has more ____ risk than a company with appropriate procedures that are followed regularly

Solution: investing

Explanation: As it will not provide accurate statement thus there will be high investment risk