Академический Документы
Профессиональный Документы
Культура Документы
TRUE/FALSE
1. The ethical principle of justice asserts that the benefits of the decision should be distributed fairly to
those who share the risks.
ANS: T
2. The ethical principle of informed consent suggests that the decision should be implemented so as to
minimize all of the risks and to avoid any unnecessary risks.
ANS: F
ANS: T
4. Business ethics is the analysis of the nature and social impact of computer technology, and the
corresponding formulation and justification of policies for the ethical use of such technology.
ANS: F
5. Para computer ethics is the exposure to stories and reports found in the popular media regarding the
good or bad ramifications of computer technology.
ANS: F
ANS: T
7. Copyright laws and computer industry standards have been developed jointly and rarely conflict.
ANS: F
ANS: F
ANS: T
10. The trend toward distributed data processing increases the exposure to fraud from remote locations.
ANS: T
11. The external auditor is responsible for establishing and maintaining the internal control system.
ANS: F
13. Controls in a computer-based information system are identical to controls in a manual system.
ANS: F
ANS: T
15. Ethical issues and legal issues are essentially the same.
ANS: F
16. Internal control systems are recommended but not required of firms subject to the Foreign Corrupt
Practices Act.
ANS: F
17. Operations fraud is the misuse or theft of the firm’s computer resources.
ANS: T
18. The Foreign Corrupt Practices Act requires only that a firm keep good records.
ANS: F
19. A key modifying assumption in internal control is that the internal control system is the responsibility
of management.
ANS: T
20. Database management fraud includes altering, updating, and deleting an organization’s data.
ANS: F
21. While the Sarbanes-Oxley Act prohibits auditors from providing non-accounting services to their audit
clients, they are not prohibited from performing such services for non-audit clients or privately held
companies.
ANS: T
22. The Sarbanes-Oxley Act requires the audit committee to hire and oversee the external auditors.
ANS: T
23. Section 404 requires that corporate management (including the CEO) certify their organization’s
internal controls on a quarterly and annual basis.
ANS: F
24. Section 302 requires the management of public companies to assess and formally report on the
effectiveness of their organization’s internal controls.
ANS: F
25. The objective of SAS 99 is to seamlessly blend the auditor’s consideration of fraud into all phases of
the audit process.
ANS: T
MULTIPLE CHOICE
1. Which ethical principle states that the benefit from a decision must outweigh the risks, and that there is
no alternative decision that provides the same or greater benefit with less risk?
a. minimize risk
b. justice
c. informed consent
d. proportionality
ANS: D
2. Individuals who acquire some level of skill and knowledge in the field of computer ethics are involved
in which level of computer ethics?
a. para computer ethics
b. pop computer ethics
c. theoretical computer ethics
d. practical computer ethics
ANS: A
5. For an action to be called fraudulent, all of the following conditions are required except
a. poor judgment
b. false representation
c. intent to deceive
d. injury or loss
ANS: A
10. Who is responsible for establishing and maintaining the internal control system?
a. the internal auditor
b. the accountant
c. management
d. the external auditor
ANS: C
12. Which of the following is not a limitation of the internal control system?
a. errors are made due to employee fatigue
b. fraud occurs because of collusion between
two employees
c. the industry is inherently risky
d. management instructs the bookkeeper to
make fraudulent journal entries
ANS: C
17. The bank reconciliation uncovered a transposition error in the books. This is an example of a
a. preventive control
b. detective control
c. corrective control
d. none of the above
ANS: B
18. In balancing the risks and benefits that are part of every ethical decision, managers receive guidance
from each of the following except
a. justice
b. self interest
c. risk minimization
d. proportionality
ANS: B
19. Which of the following is not an element of the internal control environment?
a. management philosophy and operating style
b. organizational structure of the firm
c. well-designed documents and records
d. the functioning of the board of directors and
the audit committee
ANS: C
20. Which of the following suggests a weakness in the internal control environment?
a. the firm has an up-to-date organizational
chart
b. monthly reports comparing actual
performance to budget are distributed to
managers
c. performance evaluations are prepared every
three years
d. the audit committee meets quarterly with the
external auditors
ANS: C
22. According to SAS 78, an effective accounting system performs all of the following except
a. identifies and records all valid financial
transactions
b. records financial transactions in the
appropriate accounting period
c. separates the duties of data entry and report
generation
d. records all financial transactions promptly
ANS: C
23. Which of the following is the best reason to separate duties in a manual system?
a. to avoid collusion between the programmer
and the computer operator
b. to ensure that supervision is not required
c. to prevent the record keeper from authorizing
transactions
d. to enable the firm to function more efficiently
ANS: C
26. The decision to extend credit beyond the normal credit limit is an example of
a. independent verification
b. authorization
c. segregation of functions
d. supervision
ANS: B
27. When duties cannot be segregated, the most important internal control procedure is
a. supervision
b. independent verification
c. access controls
d. accounting records
ANS: A
28. An accounting system that maintains an adequate audit trail is implementing which internal control
procedure?
a. access controls
b. segregation of functions
c. independent verification
d. accounting records
ANS: D
29. Employee fraud involves three steps. Of the following, which is not involved?
a. concealing the crime to avoid detection
b. stealing something of value
c. misstating financial statements
d. converting the asset to a usable form
ANS: C
31. The importance to the accounting profession of the Foreign Corrupt Practices Act of 1977 is that
a. bribery will be eliminated
b. management will not override the company’s
internal controls
c. firms are required to have an effective
internal control system
d. firms will not be exposed to lawsuits
ANS: C
32. The board of directors consists entirely of personal friends of the chief executive officer. This indicates
a weakness in
a. the accounting system
b. the control environment
c. control procedures
d. this is not a weakness
ANS: B
33. Computer fraud can take on many forms, including each of the following except
a. theft or illegal use of computer-readable
information
b. theft, misuse, or misappropriation of
computer equipment
c. theft, misuse, or misappropriation of assets by
altering computer-readable records and files
d. theft, misuse, or misappropriation of printer
supplies
ANS: D
34. When certain customers made cash payments to reduce their accounts receivable, the bookkeeper
embezzled the cash and wrote off the accounts as uncollectible. Which control procedure would most
likely prevent this irregularity?
a. segregation of duties
b. accounting records
c. accounting system
d. access controls
ANS: A
35. The office manager forgot to record in the accounting records the daily bank deposit. Which control
procedure would most likely prevent or detect this error?
a. segregation of duties
b. independent verification
c. accounting records
d. supervision
ANS: B
38. The four principal types of fraud include all of the following except
a. bribery
b. gratuities
c. conflict of interest
d. economic extortion
ANS: B
39. The characteristics of useful information include
a. summarization, relevance, timeliness,
accuracy, and completeness
b. relevance, summarization, accuracy,
timelessness, and completeness
c. timeliness, relevance, summarization,
accuracy, and conciseness
d. disaggregation, relevance, timeliness,
accuracy, and completeness
ANS: A
41. Management can expect various benefits to follow from implementing a system of strong internal
control. Which of the following benefits is least likely to occur?
a. reduced cost of an external audit.
b. prevents employee collusion to commit fraud.
c. availability of reliable data for decision-
making purposes.
d. some assurance of compliance with the
Foreign Corrupt Practices Act of 1977.
e. some assurance that important documents and
records are protected.
ANS: B
43. Which of the following is not an issue to be addressed in a business code of ethics required by the
SEC?
a. Conflicts of interest
b. Full and Fair Disclosures
c. Legal Compliance
d. Internal Reporting of Code Violations
e. All of the above are issues to be addressed
ANS: E