AC 25088

subject Type Homework Help
subject Pages 9
subject Words 1604
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
________ is a plan that specifies how to resume not only IT operations but all business
processes in the event of a major calamity.
A) Disaster recovery plan
B) Business continuity plan
C) Real-time monitoring plan
D) Business contingency plan
A ________ determines the correctness of the logical relationship between two data
items.
A) field check
B) alpha-numeric check
C) range check
D) reasonableness test
Using the database depicted above, "Date" is best described as
A) a primary key.
B) a foreign key.
C) a non-key attribute.
D) an attribute.
New employees of Baker Technologies are assigned user names and appropriate
permissions. Each of them were given a company's issued laptop that have an integrated
fingerprint reader. In order to log in, the user's fingerprint must be recognized by the
page-pf2
reader. This is an example of a(n)
A) authorization control.
B) biometric device.
C) remote access control.
D) defense in depth.
A neural network is a software program that has
A) the ability to read text.
B) the ability to learn.
C) the capability to extract information from an individual's brain.
D) the capability to inject information into an individual's brain.
For strongest segregation of duties, the credit manager should never report to
A) the marketing department.
B) the accounting department.
C) the credit department.
D) the IT department.
Grizzly Delivery determines the cost per delivery by averaging total cost over the
number of deliveries. What costing approach does Grizzly Delivery use?
A) unit-based
B) job-order
C) process
page-pf3
D) activity-based
The project committee for ALDI corporation is attempting to evaluate design
alternatives proposed for a new, organization-wide accounting information system.
However, there is a great deal of debate regarding whether accessing data access should
be random, sequential, or indexed. Which design consideration is most appropriately
associated with these alternatives?
A) Communication channels.
B) Data storage structure.
C) File organization and access.
D) Input medium.
Which of the following is a true statement?
A) Business strategy directly influences AIS, but not information technology.
B) Information technology directly influences organizational culture, but not business
strategy.
C) Organizational culture directly influences business strategy, but not AIS.
D) AIS directly influences information technology, but not business strategy.
All of the following are reasons a company might choose to outsource its systems
operations and maintenance except
A) increased flexibility.
B) increased innovation.
page-pf4
C) reduce costs.
D) foster competition.
Two or more primary keys of other database tables that, together, become the unique
identifier or primary key of an M:N relationship table are called
A) two attributes keys.
B) concatenated keys.
C) connecteated keys.
D) conjoined keys.
Identify a control commonly used by organizations during the output design phase of
the physical systems design stage of developing a new system to avoid expensive time
delays later in the SDLC process.
A) Requiring management to test the system before proceeding.
B) Requiring programmers to alert the project team when they are exceeding their
allocated time budgets.
C) requiring the development team to take time-off so that they do not become fatigued.
D) Requiring users to sign a document stating the output form and content are
acceptable.
Executive immersion experiences are important because
A) CEOs often have no idea what rank-and-file employees do on a daily basis.
B) employees who have positive attitudes contribute to increasing company profits.
page-pf5
C) many employees feel upper management is out of touch.
D) it is important for organizations to take social responsibility seriously.
Which of the following is not a common design feature of housing mission-critical
servers and databases?
A) Adequate air-conditioning systems to reduce the likelihood of damage due to
overheating.
B) Overhead sprinklers to provide protection from fire.
C) Cables with special plugs that cannot be easily removed.
D) Surge-protection devices to provide protection against temporary power fluctuations.
"Pull manufacturing" is also known as
A) manufacturing resource planning (MRP).
B) just-in-time manufacturing system (JIT).
C) the economic order quantity (EOQ) system.
D) ahead-of-time production implementation (ATPI).
The type of journal that records large numbers of repetitive transactions such as sales,
cash receipts, and cash disbursements is
A) a general journal.
B) a subsidiary journal.
C) a specialized journal.
D) a detailed transaction journal.
page-pf6
The VP of Manufacturing at Roshanak Incorporated wants to buy a new die cast
machine for production. The die cast machine is expected to cost around $1,000,000.
Which document will most likely be used to solicit bids from suppliers?
A) RFP
B) eVoice
C) RFJ
D) RFB
Special software packages called ________ can help an organization manage customer
service.
A) EDI systems
B) CRM systems
C) POS systems
D) VMI systems
One of the purposes of the ________ is to guide physical systems design activities.
A) conceptual systems design report
B) physical systems design report
C) program design
D) systems analysis report
page-pf7
Organizing the audit team and the physical examination of assets are components of
which two separate audit stages?
A) Planning; evaluating audit evidence.
B) Planning; collecting audit evidence.
C) Collecting audit evidence; communicating audit results.
D) Communicating audit results; evaluating audit evidence.
A value chain typically consists of five primary activities that can directly provide value
to customers. The activities that help to transform inputs into final products or services
represent
A) inbound logistics.
B) outbound logistics.
C) marketing and sales.
D) operations.
Identify one way to improve the accuracy of inventory records that use a perpetual
inventory approach
A) use of an ERP system
B) require the accounting department to calculate cost of goods sold periodically
C) use IT to eliminate the need for manual data entry
D) use of an MRP inventory system
page-pf8
Transaction cycles can be summarized on a high level as "give-get" transactions. An
example of "give-get" in the revenue cycle would be
A) give cash, get goods.
B) give goods, get cash.
C) give cash, get labor.
D) give cash, get cash.
On the weekends, Mary Andersen climbs into her Toyota Camry and drives around the
city of Las Vegas looking for unprotected wireless networks to exploit. Mary is most
likely engaging in
A) snarfing.
B) Wi-pilfering.
C) war driving.
D) data slurping.
Which of the following is not a way to improve fraud detection?
A) Install fraud detection software.
B) Implement a fraud hotline.
C) Employ a computer security officer.
D) Implement computer-based controls over input, processing, storage, and output
activities.
page-pf9
Use the chart below to answer the following questions regarding flow chart symbols.
Which symbol would be used in a flowchart to represent a manual process?
A) #5
B) #6
C) #10
D) #8
Which of the following is a system that automates and facilitates business process
improvements throughout the system development life cycle?
A) Business process reengineering system (BPRS).
B) Business process innovation system (BPIS).
C) Business process management system (BPMS).
D) Business process diagramming system (BPDS).
A(n) ________ audit is concerned with the economical and efficient use of resources
and the accomplishment of established goals and objectives.
A) operational or management
B) financial
C) information systems
D) internal control
page-pfa
The evidence collection method that considers the relationships and trends among
information to detect items that should be investigated further is called
A) review of the documentation.
B) vouching.
C) physical examination.
D) analytical review.
The system and processes used to issue and manage asymmetric keys and digital
certificates are known as
A) asymmetric encryption.
B) certificate authority.
C) digital signature.
D) public key infrastructure.
In 2015, Singh Manufacturing implemented a Web-based information system that
allows all employees to access mission-critical information. The intention was to
increase production efficiency. Unfortunately, it had the opposite effect, as deliveries
fell behind schedule and costs increased. Shaman Gupta, the director of information
technology services, asked Ashlee Wells to come in and talk with him about the system.
Ashlee is a long-time employee of Singh, and her opinion is valued by her peers and by
her supervisor.
"So Ashlee, how's it going down there in the shop?"
"Not so good, Shaman. Used to be we got a weekly pick list so we knew how to plan
production. Now, we got that computer system. Most of us can't figure out how to use it
page-pfb
to do our jobs. Is there some way to print out a pick list?"
Shaman thought for a while before responding. "Well, Ashlee, to tell you the truth, I'm
not so sure how to do it myself, but there must be a way. We'll bring in the consultants
that helped us build the system. Maybe they can help."
Which of the following characteristics of useful information is absent in the situation
described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Data must be converted into information to be considered useful and meaningful for
decision making. There are seven characteristics that make information both useful and
meaningful. If information is free from error or bias and accurately represents the
events or activities of the organization, it is representative of the characteristic of
A) relevancy.
B) timeliness.
C) understandability.
D) reliability.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.