a) System checks and controls that should be built into the system:
o Input authorization- where particular people are allowed to handle certain
information.
o Batch controls and balancing-which reduces the auditor‘s work.
o Data validation and editing facilities.
o Error identification facilities.
o A program to keep track of audit trails.
b) Audit trail
Audit trails can be defined as a record of file updating that takes place during a specific
transaction. It enables a trace to be kept on all operations on files i.e. audit trail refers to
the ability to trace output back to the inputs. The loss of audit trail has an implication in
auditing of computer based systems e.g. the auditor will have to be concerned whether the
controls within the system have always been operating.
c) (i) Auditing around the computer
Here, one is not concerned about the accuracy only but should be concerned if there is
any weakness being abused i.e. check the process being undertaken. In this approach,the system is assumed to be a black box and the concerned will be whether one given
input will give rise to the right outputs. This type of audit does not check for
weaknesses in the system as one is only concerned with the correctness of output.
(ii) Auditing through the computer
It involves an examination of processing procedures or routines within the system and
also the controls incorporated within the system in order to ensure that the system is
capable of providing complete and accurate processing of all data.
(iii) Auditing packages
These are computer programs that can be used for audit purposes to examine the
content of business computer files. These audit programs can be: -
o Generalized packages.
o Specific packages- written packages (tailored packages).
Generalized packages
These are programs written by auditors/specialists that can be used in different types of
systems. Given that there are general programs, they can therefore be applied in
different organizations. This means that these programs can be tailored by designing the
format of the files to be interrogated and by specifying the parameters of output data
that is required.
Specifically written packages
These are specific software that is written so that they can interrogate or be used in a
given organization.
gregorymasila answered the question on February 15, 2018 at 16:18
- One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of...(Solved)
One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of the open systems concept.
b) Discuss the implications of the move towards open systems for organizations that have
already invested in proprietary information systems.
c) Outline two potential benefits to information technology due to the move towards open
systems.
Date posted: February 15, 2018. Answers (1)
- (a) A major source of errors in computer systems is errors in the input data. What controls would you install for the control of such errors?...(Solved)
(a) A major source of errors in computer systems is errors in the input data. What controls
would you install for the control of such errors?
(b) Describe four methods that would be used for fact finding during system investigation.
(c) Give the principal method of data capture in the following applications:
(i.) Banks;
(ii.) Supermarkets
(iii.) Clothing and footwear retailing.
(d) What are the functions of a systems programmer?
Date posted: February 15, 2018. Answers (1)
- In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization
b. Describe some of the ethical dilemmas...(Solved)
In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization.
b. Describe some of the ethical dilemmas that are involved with Information Systems.
Date posted: February 15, 2018. Answers (1)
- Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of...(Solved)
Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of Enterprise computing and industrial networks;
b. What are the business and technological reasons for this move?
c. Outline the key elements required to build an enterprise information technology structure
d. Outline potential organisational problems in the creation of these enterprises systems.
Date posted: February 15, 2018. Answers (1)
- In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error,...(Solved)
In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error, abuse and misuse than
manual systems?
b. What is meant by the term Risk Assessment?
c. What are Worms and Viruses?
d. Outline the process of Public Key Encryption.
Date posted: February 15, 2018. Answers (1)
- The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for...(Solved)
The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for an organization‘s internal and external
communications: -
a. Client-Server
b. Internet
c. Intranet
d. Extranet
Date posted: February 15, 2018. Answers (1)
- Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are...(Solved)
Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are faced with are: -
a. Easy product identification;
b. Fast customer processing at the cash tills;
c. Extremely efficient stock control;
d. Rapid bulk replacement of goods from suppliers.
Describe in detail how Information Systems can help supermarket chains with these specific
objectives. Your answer should outline the systems involved, the hardware that might be
required and an indication of how the various systems might interact with each other.
Date posted: February 15, 2018. Answers (1)
- Differentiate between pseudo code and flowcharts(Solved)
Differentiate between pseudo code and flowcharts.
Date posted: February 14, 2018. Answers (1)
- What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code(Solved)
What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code
Date posted: February 13, 2018. Answers (1)
- What is a predicate in a system program?(Solved)
What is a predicate in a system program?
Date posted: February 13, 2018. Answers (1)
- Give one advantage and one disadvantage of using the string data type in a computer program. (Solved)
Give one advantage and one disadvantage of using the string data type in a computer program.
Date posted: February 13, 2018. Answers (1)
- Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.(Solved)
Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.
Date posted: February 13, 2018. Answers (1)
- How does the STL make it easier for a programmer more reliable C++ programs?(Solved)
How does the STL make it easier for a programmer to create more reliable C++ programs.
Date posted: February 13, 2018. Answers (1)
- Describe the function of mutable in a computer program.(Solved)
Describe the function of mutable in a computer program.
Date posted: February 13, 2018. Answers (1)
- Explain the term namespace as used in a C++ program.(Solved)
Explain the term namespace as used in a C++ program.
Date posted: February 13, 2018. Answers (1)
- What is the principal restriction placed on a const member function in a C++ program?(Solved)
What is the principal restriction placed on a const member function in a C++ program?
Date posted: February 12, 2018. Answers (1)
- Explain the purpose of explicit in a C++ program.(Solved)
Explain the purpose of explicit in a C++ program.
Date posted: February 12, 2018. Answers (1)
- What does a conversion function do in a C++ program?(Solved)
What does a conversion function do in a C++ program?
Date posted: February 12, 2018. Answers (1)
- Given a function called counter(), show the statement that causes the compiler to compile this function for C language linkage.(Solved)
Given a function called counter(), show the statement that causes the compiler to compile this function for c language linkage
Date posted: February 12, 2018. Answers (1)
- What header must be included in a C++ program when using array-based I/O ? (Solved)
What header must be included in a C++ program when using an array-based I/O?
Date posted: February 12, 2018. Answers (1)