TUGAS KELOMPOK INFORMATION TECNOLOGY AUDITING and ASSURANCE

INFORMATION TECNOLOGY AUDITING and ASSURANCE

Kelas : 4EB15
Nama Kelompok :
1. Fahranirawaty Warandy
2. Anggi Maharani
3. Oktaviola Rifanda
4. Karima Afifah
5. Yemi Jelsen
6. Yanita Utami

II. Review Test
1. A
2. B
3. B
4. D
5. A
6. C
7. E
8. A
9. D

IV. Post Test
A_____ by individual.

a. Anggi Maharani (no.3)
Answer : Application programs created by one user, which could be used with little or no change by others, will be redesigned from scratch rather than shared.

b. Fahranirawaty Warandy (No.19)
Answer : Data Conversion is transcribe transaction data from paper source documents into computer input. for example, we transcribe some of purchase goods data into purchase goods application in computer.

c. Karima Afifah (No.24)
Answer :
1. An .EXE or .COM program file
2. An .OVL (overlay) program file
3. The boot sector of a disk
4. A device driver program
5. An operating system file (e.g.,DLL)
d. Oktaviola Rifanda (no.29)
Answer : Because operational managers are performers and users of information systems. Information systems used within the company that is specifically geared to support operational managers.

e. Yanita Utami (no. 46)
Answer : The corporate IT group is better able to evaluate the merits of competing vendor software and hardware. A central, technically astute group such as this can evaluate systems features, controls, and compatibility with industry and organizational standards most efficiently. Test results can then be distributed to user areas as standards for guiding acquisition decisions. Therefore, the organization should centralize the acquisition, testing, and implementation of software and hardware at the corporate IT function.

f. Yemi Jelsen (no.48)
Answer : Commercially provided electrical power presents several problems that can distrupt the computer center operations, including total power failures, brownouts, power fluctuatuins, and frequency variations. The equipment used to control these problems includes voltage regulators, surge protectors, generators, and batteries.

2. Answer :
a. “ gleicken corporation had lack of separation of power between programming with operation function but they have unquallified compesanting control after reviewed by Gustave,ACP. Coment,inc Compesanting control might be make expand of managing control who hiring some competence and responsible employees in controlling then handle each problems or works which running by programming and operation function accordance gleoken corporation internal controlling”
4. Answer :
a. the loss some records of gleicken corporation was made by the computer security weakness comprises:

-. Ineffective on Fire extinguishing implementation makes loss those data
-. The gleicken corporation building have no an automatic fire extinguishing system that dispenses the appropriate type of suppresant for the location.
-. The openess of minicomputer distributive processing hardware makes the data processing area enable to access all of staff .
-. The physical computer of the computer center location was in around of traffic flows of staff activities, it should be away from other activities so that the computer processing doesn’t interrupted by.

b. that disaster make The gleicken corporation lose their data processing facilities, this disaster could also result of loss of clients and investment. Disaster recovery planning important for them to rebuild the computer center as soon. Creating a disaster recovery team is first aid to recover this disaster, to avoid serious omission of effort during implementation of plan, task responbility must be clearly defined and communicated to the person involved. The team members hould be expert in their skill. Following the disaster, team member will delegate some works for their subting. What must the team member do when the disaster occured ? the answer are :

-. Prepare backup location for operation and acquire the hardware from vendors.
-. Provide current versions applications, data files, and curcial documents.
-. Reestablish the data conversion and data control functions necessary to process important applications.

c. othe factor should formulating by The Gleicken. Corp to recovery disaster are :
-. identifying critical applications that associated with data files. Recovery efforts must be concenstrated on restoring those critical application to the short-run survival of the organization.
-. Providing site backup, this is one of the important ingredients to formulating disaster recovery plan. It must have duplicate data processing facilities after the disaster happened. The various site backup used as recovery disaster plan are recovery operation center, empty shell, mutual aid pact, hardware backup, software backup (operating system and software), backup data files, bckup documents, back supplies and source documents.

kelas : 4EB15
jawaban yang saya post ini terdiri dari tugas kelompok saya dan individu. adapun tugas individu :
A__ individual assignment !

19. what is the data conversion ?

Answer :
” Data Conversion is transcribe transaction data from paper source documents into computer input. for example, we transcribe some of purchase goods data into purchase goods application in computer ”

Adapun tugas dari kelompok, berikut nama kelompok kami :
1. Anggi Maharani (20210823)
2. Fahranirawaty Warandy (22210513)
3. Karima Afifah (23210833)
4. Oktaviola Rifanda (25210266)
5. Yanita Utami (28210595)
6. Yemi Jelsen (29210690)

B__ Group Assignment !

II. PRE-TEST
so here are the answer below :
1. A. Distributed Data Processing Network
2. B. The potential of hardware and software incompatibility among users
3. B. User satisfaction
4. D. They are all equally beneficial
5. A. Operating system controls
6. C. Logic bomb
7. E. Access control unit
8. A. Operating system
9. D. Multiprogramming

IV. Type B

our group was acquired to answer number 2 and 4..

2. Internal Control
Gustave, CPA, during its preliminiary review of the financial statement of Coment,inc., found of lack proper segeration of duties between the programming and operating functions. Comet owns its own computing facilities. Gustave, CPA, diligently intensified the internal control study and assessment tasks relating to the computer facilities. Gustave concluded in its final report that sufficient compensating general controls provided reasonable assurance that the internal control objectives were being met.

required :
What compensating controls are most likely in place ?

Answer :
” coment corporation had lack of segaration of duties between programming with operation function but they have unquallified and sufficient compesanting control after reviewed by Gustave,ACP. Coment,inc Compesanting control might be make expand of managing control who hiring some competence and responsible employees in controlling then handle each problems or works which running by programming and operation function accordance coment,inc internal controlling ”

4. a. the loss some records of gleicken corporation was made by the computer security weakness comprises:
-. Ineffective on Fire extinguishing implementation makes loss those data
-. The gleicken corporation building have no an automatic fire extinguishing system that dispenses the appropriate type of suppresant for the location.
-. The openess of minicomputer distributive processing hardware makes the data processing area enable to access all of staff .
-. The physical computer of the computer center location was in around of traffic flows of staff activities, it should be away from other activities so that the computer processing doesn’t interrupted by.

b. that disaster make The gleicken corporation lose their data processing facilities, this disaster could also result of loss of clients and investment. Disaster recovery planning important for them to rebuild the computer center as soon. Creating a disaster recovery team is first aid to recover this disaster, to avoid serious omission of effort during implementation of plan, task responbility must be clearly defined and communicated to the person involved. The team members hould be expert in their skill. Following the disaster, team member will delegate some works for their subting. What must the team member do when the disaster occured ? the answer are :

-. Prepare backup location for operation and acquire the hardware from vendors.
-. Provide current versions applications, data files, and curcial documents.
-. Reestablish the data conversion and data control functions necessary to process important applications.

c. other factor should formulating by The Gleicken. Corp to recovery disaster are :
-. identifying critical applications that associated with data files. Recovery efforts must be concenstrated on restoring those critical application to the short-run survival of the organization.
-. Providing site backup, this is one of the important ingredients to formulating disaster recovery plan. It must have duplicate data processing facilities after the disaster happened. The various site backup used as recovery disaster plan are recovery operation center, empty shell, mutual aid pact, hardware backup, software backup (operating system and software), backup data files, bckup documents, back supplies and source documents.

Pos ini dipublikasikan di Uncategorized. Tandai permalink.

Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout / Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout / Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout / Ubah )

Foto Google+

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s