The Control file

When auditing computerized information systems, it will be found that much reliance is placed within the system upon standard forms and documentation in general, as well as upon strict adherence to procedures laid down. This is no surprise, of course, Read More …

Share this:

Uses of computer audit programs.

In the selection of representative or randomly chosen transactions or items for audit tests. The scrutiny of files and selection of exceptional items for testing. E.g. On wages payments over Shs.1000 or all stock items worth more than Shs.100,000 in Read More …

Share this:

2014 September – December KCA Past Paper

BIT 2109   PROFESSIONAL ISSUES OF INFORMATION TECHNOLOGY – DISTANCE LEARNING KCA Past Paper BIT 2208 PRINCIPLES OF DATA COMMUNICATIONS BIT 2301 RESEARCH METHODS KCA Past Paper BIT 2308  HUMAN COMPUTER INTERACTION – (DISTANCE LEARNING) KCA Past Paper BIT 3102 INFORMATION Read More …

Share this:

Internal controls in a computerized information system

To mitigate the risks occasioned by the features of a computerized information system, the management should design internal controls over the system. These controls are mainly classified into general controls and application controls. 1. General controls. These relate to the Read More …

Share this:

Computer files.

These are equivalent of books and records in a manual system and are described as either transaction files or master files. 1. Transaction files. These are equivalent of journal such as sales journal, the purchases journal or the cash book. Read More …

Share this:

2015 January – April KCA Past Papers

BIT 1104A BUSINESS COMMUNICATION SKILLS KCA Past Paper BIT 1106 BBIT 102 COMPUTER ORGANISATION AND APPLICATIONS DISTANCE LEARNING KCA Past Paper BIT 1106A BCT 1101 OPERATING SYSTEMS  KCA Past Paper BIT 1106A OPERATING SYSTEM DISTANCE LEARNING KCA Past Paper BIT Read More …

Share this: