Please I need the answers for 5-6-7-8 a. applicat b.general c. specific d. input
ID: 2548778 • Letter: P
Question
Please I need the answers for 5-6-7-8 a. applicat b.general c. specific d. input e. none of the above 2. A source data control that calculates a separate digit which is added on to codes and account numbers for the purpose of later recalculation and verification is a(n): a, waste of time b. check digit e, edit check d. key verification e none of the above 3. When audit risk isthen auditors must take larger samples of data during the a. control, low b. control, high e. acceptable audit, high d. investing,low e. consumer, low 4. Which of the following will not prodect your personal information while your system i connected to the Internet a firewal b, encryption c laptop proximity alarm d. an anonymous browse e. socure r S. A compuaer operator inadvertently has loaded the wrong CD when updating the inventory file Which of the following is most likely to detect sach an emor? a password centirol procedures h reading internal and exienal labels d physical aocess controls e. encrypton Peroanel policios sach as background checks, mandatory vacations, and rotation of duties will tend to deter ntentional errors h employee fraud c fraud by outsiders d. payroll imegularities e fowensic accounding 7 Which step would be inappropriate in trying to achieve good control over program changes? a formal authorization for program changes b programmers making bug fixes immediately when problems are noted e. sabmission to the supervisor for approval of modifications d. thorough testing of changes before implementation e separation of programming and authorizing changes & A comipany that has procedures for data entry that are not followed has more a company with appropriate procedures that are followed regularly. risk t a control b. detection e. acceptable d. investing
Explanation / Answer
5) A computer operator inadvertently has loaded the wrong CD when updating the inventory file. Likely to detect an error with
Solution: encryption
Explanation: NetIQ input files holds an verification identifier built for preventing from accidentally loading the wrong type of file
6) Personal policies such as background checks, mandatory vacations, and rotation of duties will lend to deter
Solution: employee fraud
Explanation: Personal policies such as background checks, mandatory vacations, and rotation of duties will lend to deter employee fraud or embezzlement
7) Which step would be inappropriate in trying to achieve good control over program changes?
Solution: separation of programming and authority changes
Explanation: separation of programming and authority changes will not be included
8) A company that has procedures for data entry that are not followed has more ____ risk than a company with appropriate procedures that are followed regularly
Solution: investing
Explanation: As it will not provide accurate statement thus there will be high investment risk