1. All controls available for the computerized accounting information system of a company should be implemented regardless of cost due to the high rate of computer crime.
2. One of the “fallback” procedures of a computing center is the “grandfather parent-child” file arrangement.
3. According to the text, data transcription would only be necessary for a computerized accounting information system.
4. Edit checks are very rarely used because they are not cost-effective controls.
5. Information processing personnel usually only use selective edit checks in data processing applications due to the cost of computer time necessary for editing.
6. Testing processing programs with test data is performed only when a system is first installed due to the high costs of such test runs.
7. The audit trail is easier to follow in an online computerized system as compared to a batch system.
8. No record of transactions is made in an online computerized system.
9. Most computer vandalism is performed by “professional” computer criminals who have no personal contact with the computer centers they disrupt.
10. The primary function of controls for a computerized accounting information system is to detect computer fraud.
11. Input controls attempt to assure the accuracy and completeness of the data fed into the CPU for processing.
12. It is more difficult to safeguard logical computer access than it is to safeguard physical computer access.
13. Output controls for the computerized accounting information system focus primarily on the security and distribution of print media prepared by the computer center.
14. Biometric identifications are irrelevant to computer network systems.
15. Consensus-based protocols contain an odd number of processors.