1.
Which of the following is (are) a typical example of batch processing?
Correct Answer
C. Both a and b
Explanation
Both processing weekly time reports to produce paychecks and processing groups of checks to update accounts payable files are typical examples of batch processing. Batch processing involves grouping similar tasks together and processing them as a batch, usually without any user interaction. In both scenarios mentioned, the tasks are performed in batches, where the time reports or checks are processed together to produce paychecks or update accounts payable files respectively.
2.
Accumulating source documents into groups prior to processing is a characteristic of _____?
Correct Answer
A. Batch processing
Explanation
The given correct answer is batch processing. Batch processing involves accumulating source documents into groups before processing them. This method allows for efficient processing of large amounts of data at once, reducing the need for real-time processing. Therefore, the characteristic described in the question aligns with batch processing.
3.
Which of the following errors probably would be corrected by key verification of data input?
Correct Answer
B. A data entry operator in the information systems department mistypes a product number on a sales invoice while keying the document to machine readable format.
Explanation
Key verification of data input involves comparing the data entered by a data entry operator with the original source to identify and correct errors. In this case, the correct answer is "A data entry operator in the information systems department mistypes a product number on a sales invoice while keying the document to machine readable format." This error would be identified and corrected through key verification, as the operator's input would be compared with the original sales invoice to ensure accuracy.
4.
Which of the following controls would prevent the following situation? A worker's paycheck was processed incorrectly because he had transposed letters in his department identification code, having entered ABC, an invalid code, instead of CAB.
Correct Answer
D. Table-lookup procedure
Explanation
A table-lookup procedure would prevent the situation described because it involves using a table or database to validate and lookup codes or values. In this case, the worker's department identification code would be checked against the table or database to ensure that it is valid before processing the paycheck. This would catch the error of entering an invalid code, like ABC, and prevent the paycheck from being processed incorrectly.
5.
The son-father-grandfather concept of backing up master files can be used when master files are stored on ______?
Correct Answer
C. Both a and b
Explanation
The son-father-grandfather concept of backing up master files can be used when master files are stored on both magnetic tape and magnetic disk. This concept involves creating multiple copies of the master files at different points in time, with each copy serving as a backup. By using both magnetic tape and magnetic disk, organizations can ensure that their master files are securely backed up and can be easily restored in case of data loss or system failure. Magnetic tape provides a cost-effective and efficient solution for long-term storage, while magnetic disk offers faster access and recovery times.
6.
A review of an EDP system reveals the following items. Which of these is a potential internal control weakness?
Correct Answer
B. Users must verbally approve all changes to be made to application programs
Explanation
The potential internal control weakness in this scenario is that users must verbally approve all changes to be made to application programs. This process is not efficient or reliable as it relies on verbal communication, which can easily lead to miscommunication or misunderstanding. It is preferable to have a formal and documented process for approving changes to ensure accuracy and accountability.
7.
For control purposes, data clerks total up the employee Social Security numbers in each batch of payroll transactions. Which of the following terms best describes the resulting total?
Correct Answer
A. Hash total
Explanation
A hash total is a term used to describe the resulting total of employee Social Security numbers that data clerks calculate for control purposes in each batch of payroll transactions. This total is generated using a hash function, which takes the input of the Social Security numbers and produces a unique value. The hash total helps ensure the integrity and accuracy of the data by providing a way to verify that the numbers have not been altered or tampered with during processing.
8.
In an on-line computer system, which of the following may be used to ensure that users have proper authorization to perform a task?
Correct Answer
B. Passwords
Explanation
Passwords are commonly used in on-line computer systems to ensure that users have proper authorization to perform a task. A password acts as a security measure by requiring users to provide a unique combination of characters that only they should know. This helps to verify the identity of the user and restrict access to unauthorized individuals. By setting up passwords, the system can ensure that only authorized users can perform specific tasks, thereby enhancing the overall security of the system.
9.
For control purposes, data clerks total up the employee gross pay amounts in each batch of payroll transactions. Which of the following terms best describes the resulting total?
Correct Answer
B. Financial total
Explanation
The term "financial total" best describes the resulting total of the employee gross pay amounts in each batch of payroll transactions. This term implies that the total represents the overall financial amount of the payroll transactions, indicating the sum of all the employees' gross pay. "Hash total" refers to a total generated by applying a mathematical algorithm to a set of data, "parity total" is not a commonly used term in this context, and "record count" refers to the number of records in a dataset, not the total amount.
10.
A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?
Correct Answer
D. Check digit
Explanation
A check digit is a control mechanism used to detect errors during data processing. It involves adding an extra digit to a numerical code based on a mathematical algorithm. In this case, if the customer inadvertently orders part number 1234-8 instead of 1243-8, a check digit can be used to identify the error. The check digit would not match the calculated value for the given part number, indicating that an error has occurred in the ordering process. Therefore, a check digit control would be able to detect this error during processing.