Sei sulla pagina 1di 3

CHAPTER 1

1. Explain the internal and external flows of information


2. What are the three fundamental objective of information
3. Define transaction. Differentiate between financial and non-financial transaction.
4. Explain the 3 major subsystems of accounting information system (AIS)
5. Compare and contrast management information system (MIS) and AIS.
6. Discuss the general model of AIS.
7. Explain the key elements of AIS application
8. What is end users? Give example of internal and external users
9. Differentiate internal and external data sources. Give example
10. What are the objective of data collections? Explain 2 rules apply to data collection.
11. Explain types of data processing.
12. Explain 3 fundamental tasks of database management
13. What are the levels of data hierarchy
14. Give example of internal and external feedback
15. Define information generation.
16. Explain the characteristics of useful information.
17. Business segmentations can be derived by functions or by resources. Explain both
segments. How resources segments relate to the functional segments
18. Explain the functions of accounting in transaction processing.
19. Explain the concept of value of information and accounting independence.
20. Discuss 4 IT functions
21. Compare in house system development and purchased system
22. List 3 categories of cloud computing
23. Compare these
a. conceptual system and physical system
b. attest services and advisory services
c. internal and external auditor
d. substantive test and test of control

CHAPTER 2

1. Describe 4 types traditional records used in manual systems.


2. What is the purpose of audit trail.
3. Describe 4 types of digital computer files.
4. Discuss how digital files can provide for an audit trail.
5. Differentiate between flat file model and database model.
6. Explain the disadvantages of flat file model.
7. Compare and contrast between batch and real –time processing.
8. Explain these data coding schemes:
a. Sequential codes
b. Block codes
c. Group codes
d. Alphabetic codes
e. Mnemonic codes

CHAPTER 3
ETHICS AND FRAUD
1. Define ethics and computer ethics
2. Discuss computer ethics in regards with these concerns:
a. Privacy
b. Security
c. Ownership of property
d. Equity in access
e. Environment
f. Artificial intelligent
g. Unemployment and displacement
h. Misuse of computer
3. How a public company may display its code of ethics
4. SEC require the company to address the following concerns in its written code of ethics
in compliance with Section 406.Discuss
a. Conflicts of interest
b. Full and fair disclosure
c. Legal compliance
d. Accountability
5. Explain 5 conditions should be met to define fraud
6. Differentiate between employee frauds and management frauds
7. Explain fraud triangle
8. List any red flags questions used by auditors in evaluating any indicators of fraud cases
9. Describe 3 broad categories of fraud schemes
10. Why frauds cases still occur despite the laws and regulations implemented.
11. The SOX has been established to reform the regulation of public company auditing.
Discuss
12. Discuss 4 type of corruptions
13. Describe these types of fraud scheme
a. Skimming
b. Lapping
c. billing scheme
d. check tampering
e. payroll fraud
f. expense reimbursement
g. theft of cash
h. non-cash misappropriation
i. computer fraud
14. provide example of billing scheme

CHAPTER 3
INTERNAL CONTROL
1. List the objectives of internal control.
2. Explain 4 modifying assumptions about internal control objectives.
3. Explain 3 levels of internal control
4. Describe COSO Internal control Framework. Explain its five components
5. Explain 2 broad groups of IT controls
6. Discuss 6 categories of physical control activities.
7. Identify 3 accounting duties need to be segregated. Provide example.
8. Explain 3 objectives of segregation of duties.
9. What is check digit? Compare and contrast between transcription and transposition error
10. Explain these input controls. Provide example
a. Missing data check
b. Numeric-alphabetic check
c. Limit check
d. Range check
e. Reasonableness check
f. Validity check
11. Discuss three common processing controls
12. Master backup controls can be applied in general control or application control. Discuss
the master file backup controls in these 3 types of flat file system:
a. Batch processing using sequential files
b. Batch processing using direct access files
c. Real time processing systems
13. Suggest the controls to be applied in these output product and distribution
a. Output spooling
b. Print programs
c. Waste
d. Report distribution
e. End user controls

Potrebbero piacerti anche