A ___________ is a strategic methodology in auditing that prioritizes areas of an organization based on the level of risk they present.
Risk-Based Audit Approach
The new name of the application that is used to seek updates on different category with text such as news, ranting, and shhhh ka nalang (with an old bird logo)
X
Which of the following best describes the Scalability and Improved Flexibility advantage of cloud computing?
A. Users must purchase hardware for expansion
B. Systems can adjust based on service needs, reducing the risk of overprovision
C. Users need to plan capacity years in advance
D. Cloud services cannot adapt to sudden changes in demand
B. Systems can adjust based on service needs, reducing the risk of overprovision
Which benefit of cloud computing allows users to access data anytime, anywhere, enabling faster decision-making?
A. Improved Operational Efficiency
B. Significantly Reduced Costs
C. Mobility
D. Access Towards New Business Technologies
C. Mobility
Which of the following service models provides the least user control and is mainly used to consume applications over the internet?
A. Infrastructure-as-a-Service (IaaS)
B. Platform-as-a-Service (PaaS)
C. Software-as-a-Service (SaaS)
D. Hardware-as-a-Service (HaaS)
C. Software-as-a-Service (SaaS)
Which category does "Theft " in a computer information system belong:
a) Essential Charactrtistics of Cloud Computing
b) Types of Service Model
c) Security Errors and Fraud
d) Definition of Audit in Specialized Industries
c) Security Errors and Fraud
refers to the automated execution of programmed instructions by a computer to input, store, manipulate, and output data used in business operations.
a. Computer shop
b. Computer appliance with Philhealth card
c. Computer Studies
d. Computer Processing
d. Computer Processing
Why is “on-demand self-service” important?
a) Requires an IT expert to install
b) Delays access to apps
c) Lets users access services immediately
d) Works only in offices
c) Lets users access services immediately
Which of the following is NOT a feature of cloud computing?
a) Broad network access
b) Manual server setup
c) Resource pooling
d) Rapid elasticity
b) Manual server setup
Which of the following is not an example of switching costs?
a. Financial
b. Data Compatibility
c. Guaranteed data privacy
d. Ecosystem
c. Guaranteed data privacy
Which is not an audit procedure regarding Overall Security
a) Interviewing personnel
b) Limiting physical access
c) Reviewing policies and procedures
d) Inspecting computer sites
b) Limiting physical access
the intentional manipulation of financial records and statements to deceive stakeholders, often for personal gain. It involves misrepresenting a company's financial health.
a) Proud
b) Fruad
c) Fortuner
d) Fraud
d) Fraud
The accidental leaking of data by a cloud provider to the wrong client falls under which category of security and privacy concerns risk?
a. Data Leakages and Losses
b. Shared Access
c. Loss of Data
d. Customer Churn
b. Shared Access
What is cloud computing?
a) Installing software from a CD
b) Using online resources without owning physical hardware
c) Using electricity for internet
d) Storing data only on personal com
b) Using online resources without owning physical hardware
A cloud storage and file-sharing service commonly used for personal or team collaboration.
Dropbox
Give 2 examples of Security errors and fraud that we mentioned in the report.
Which of the following is a system review in Program Modification:
a) Frequently asking the label as if there is something to begin with
b) Conduct check up at 10PM to rethink memories of the past
c) Review policies and procedures with the system and its functions
d) Consultation with international organizations to fayt vamfires
c) Review policies and procedures with the system and its functions
Which of the following countries prohibits any processing of [personal data] unless authorized by the subjects or law?
a. USA
b. China
c. Norway
d. Switzerland
d. Switzerland
A system that provides computing services over the internet.
Cloud Computing
This service model allows users to host their own platforms and applications using computing resources such as servers, storage, and networking provided by a vendor. It follows a "pay as you use" model.
Infrastructure-as-a-Service (IaaS)
Types of errors and fraud– Inaccurate source data– Unauthorized source data
– Inaccurate source data
– Unauthorized source data
Two major AUDIT PROCEDURES stated in Program Developmement, Program Modification and Computer Processing
It is a type of risk that may occur if customers do not trust your cloud service provider.
Customer Churn
This advantage of cloud computing means that organizations can check the status of operations from anywhere, manage multiple locations, and experience a significant decrease in order processing time.
Improved Operational Efficiency
It is kept by the cloud provider.
Records