Submitted by: Submitted by andosh
Views: 10
Words: 695
Pages: 3
Category: Business and Industry
Date Submitted: 04/29/2016 04:05 PM
1. C; IT auditing is independent of the general financial audit.
2. B; a system that enforces access control between two networks
3. C; to design application programs
4. B; users perceive that they are manipulating a single table
5. B; the balance of each account in the chart of accounts
6. B; intense competition for shell resources during a widespread disaster
7. C; continuous process
8. D; the MRS focuses on internal decision-making information
9. B; the initial recovery period is very quick
10. C; Journal vouchers are not used to make adjusting entries and closing entries in the general ledger.
11. C; data lockout
12. D; results of the latest test of the disaster recovery program
13. A; managers are accountable only for items they control
14. A; the vendor's price list file
15. C; authorized trading partners have access only to approved data
16. B; improvements of legacy systems
17. C; prepares a materials requisition for each production batch
18. D; ERP systems can be modified using bolt-on software.
19. C; financial statements are prepared based on the unadjusted trial balance
20. B; restricting access to data to the primary user
21. D; systems professionals and their supervisors work at the same physical location
22. B; permitting computer operators unlimited access to the computer room
23. B; inventory control maintains custody of inventory items
24. B; analysis of the fire detection system at the primary site
25. B; condensing data
26. B; materials requisition
27. D; defines how a particular user sees the database
28. C; When a business is diversified, little is gained from ERP installation.
29. B; reconciling program version numbers
30. A; authority refers to an individual's obligation to achieve desired results
31. A; produce information for inventory valuation
32. A; data sharing
33. C; the budget
34. B; prepare...