quiz of isa-i
TRANSCRIPT
-
7/29/2019 quiz of isa-i
1/5
Quiz on Information System Audit-I
BCA-V
Roll no: - Name: - Date:-
1. Information system auditing is function to assess whether computer
systems safeguards assets, maintain data integrity, and allows an
organization to achieve its goal ________________and___________________.
2. _________is a critical resource necessary for an organization's
continuing its operations.
3. Making high-quality decision depends the quality of the ___________and
quality of ___________ that exits in computer-based information system.
4. If ____________of an expert system that supports medical diagnosis is
incorrect in that case doctors may prescribe wrong medicine to the
patient.
5. Some major type of computer abuse are as follows
a. Hacking
b. _____________
c. illegal physical access
d. abuse of privilege
6. A person gains unauthorized access to a computer system to read,
modify or delete program or data to disrupt services is
called___________.
7. Program s which attach themselves to exe files, system areas on disks
of data files that contain macros to cause disruption of computer
operation is called____________
-
7/29/2019 quiz of isa-i
2/5
Quiz on Information System Audit-I
BCA-V
8. Specify the type of computer abuse if a person gains unauthorized
physical access to the computer facilities (gaining illegal entry to a
computer room or terminal).__________________
9. In addition to data, computer hardware, software. __________ are also
critical organizational resources.
10. Which one is not part of internal control system
a. Separation of duties
b. Clear delegation of authority and responsibility.
c. Competent and Trustworthy personnel.
d. Cost of loss of data
_____________________
11. List any two Procedures to obtain an understanding of controls.
1._____________________ 2.____________________
12. Write name of unit 2 of information system audit.
_______________________________
13. A ____________is system which prevents, detects, or corrects
unlawful act.
-
7/29/2019 quiz of isa-i
3/5
Quiz on Information System Audit-I
BCA-V
14. ____________is a set of interrelated components that function to
achieve overall goal
15. When an unauthorized, inaccurate, incomplete, redundant,
inefficient input goes in system is called________________.
16. Purpose of controls is to ___________expected loss from
unlawful acts or events.
17. When auditors failing to detect actual or potential losses or
account misstatements at the conclusion of audit is
called______________.
18. DAR=IR*CR*_______
19. Name any two systems where inherent risk factor is very high.
1.____________________
2.____________________
20. Audit opinion according to professional standards is of four types.
a. Disclaimer of opinion
b. Adverse Opinion
c. Qualified Opinion
d. Unqualified opinion
Answer
1. Effectively, efficiently.
-
7/29/2019 quiz of isa-i
4/5
Quiz on Information System Audit-I
BCA-V
2. Data
3. Data ,decision rules
4. decision rule
5. Viruses
6. Hacker
7. Virus
8. Illegal physical access.
9. Personnel
10. Cost of loss of data
11. Inquiries , observation
12. Conducting Information System Audit
13. Control.
14. System.
15. Unlawful act.
16. Reduce.
17. audit risk
18. DR.
19.Financial System.Strategic system20. Qualified Opinion
-
7/29/2019 quiz of isa-i
5/5
Quiz on Information System Audit-I
BCA-V