AC 59274

subject Type Homework Help
subject Pages 9
subject Words 1489
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A ________ control ensures that the correct and most current files are being updated.
A) cross-footing balance test
B) data matching
C) file labels
D) write-protect mechanism
Who is responsible for ensuring that the new system will meet the needs of users?
A) Accountants.
B) System programmers.
C) The project development team.
D) System analysts.
Identify the behavioral problem below that arises due to users receiving an insufficient
explanation of why a system must be changed.
A) Communication.
B) Natural resistance to change.
C) The manner in which the change is introduced.
D) Top management support of change.
The Sarbanes-Oxley Act (SOX) applies to
A) all companies with gross annual revenues exceeding $500 million.
B) publicly traded companies with gross annual revenues exceeding $500 million.
C) all private and public companies incorporated in the United States.
page-pf2
D) all publicly traded companies.
The ________ specifies the point at which inventory is needed.
A) company inventory policies
B) reorder point
C) economic order quantity
D) stockout point
The risk of the potential high cost to reverse outsourcing is referred to as
A) focus reduction.
B) locked-in system.
C) reduced competitive advantage.
D) unfulfilled goals.
________ costs are expenses associated with quality assurance activities.
A) Prevention
B) Inspection
C) Internal failure
D) External failure
page-pf3
Wisconsin Dells, Wisconsin, is a popular tourist destination. During the winter months,
the population dwindles to a meager few, but when summer comes, the size of the town
surges. Hunter Jackson is the town sanitation engineer. When the size of the town
surges, so do his responsibilities. Among them is management of the sewage processing
volume.
In an interview with the local paper, Hunter complained that a report on tourist
population that he uses to adjust processing volume refers to data that was not always
accurate and it is really giving him a hard time to make adjustments.
Which of the following characteristics of useful information is absent in the situation
described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
________ is a data entry input control that requests each input data item and waits for
an acceptable response, ensures that all necessary data are entered.
A) Prompting
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification
Emma Kolb is a system analyst at a manufacturing company located in the Midwest.
She has been asked to analyze the company's accounting information system and to
recommend cost-effective improvements. After noting that the several key managers do
not have access to the production and sales information, she recommends that they
page-pf4
should be uploaded to the company's internal network and be made available for search.
Implementation of her recommendation would benefit the company by contributing to
A) data independence.
B) data integration.
C) reduce data redundancy.
D) increase data sharing.
Which of the following is not one of the five principles of COBIT5?
A) meeting stakeholder needs
B) covering the enterprise end-to-end
C) enabling a holistic approach
D) improving organization efficiency
After graduating from college, Rob Johnson experienced some difficulty in finding
full-time employment. He free-lanced during the summer as a writer and then started a
blog in the fall. Shortly thereafter he was contacted by SitePromoter Incorporated, who
offered to pay him to promote their clients in his blog. He set up several more blogs for
this purpose and is now generating a reasonable level of income. He is engaged in
A) splogging.
B) Bluesnarfing.
C) vishing.
D) typosquatting.
page-pf5
Which of the following preventive controls are necessary to provide adequate security
for social engineering threats?
A) Controlling physical access.
B) Encryption.
C) Profiling.
D) Awareness training.
When would a company go through a systems development life cycle?
A) When major changes are needed.
B) When minor changes are needed.
C) Anytime changes are needed.
D) Usually a company only goes through one complete systems development life cycle,
after which the only phase that is repeated is the operations and maintenance phase.
Use the chart below to answer the following questions regarding flow chart symbols.
Which symbol would be used in a flowchart to represent the addition of information
about a step represented in another symbol on the flowchart?
A) #12
B) #13
C) #11
page-pf6
D) #15
A payroll clearing account is used to
A) check the accuracy of payroll costs.
B) speed up payroll transaction processing.
C) reduce the transaction costs associated with payroll transaction processing.
D) eliminate the need to manually record payroll transactions.
In the ________ stage of an operational audit, the auditor measures the actual system
against an ideal standard.
A) evidence collection
B) evidence evaluation
C) testing
D) internal control
Applying the COBIT5 framework, monitoring is the responsibility of
A) the CEO.
B) the CFO.
C) the board of directors.
D) all of the above
page-pf7
Which of the statements below is false with regards to creating database tables from an
REA diagram?
A) M:N relationships must be implemented as separate tables.
B) 1:N relationships are implemented with the primary key of the 1 side becoming a
foreign key on the N side.
C) 1:1 relationships are implemented with the primary key of either entity included as a
foreign key in the table representing the other entity.
D) All of the above are true.
It is most difficult to quantify ________ when assessing economic feasibility.
A) benefits
B) costs
C) the payback period
D) break even
To control for risks associated with the threat of inventory loss, who should have
primary responsibility for work-in-process inventories?
A) a factory supervisor
B) the inventory stores department
C) purchasing
D) the receiving department
page-pf8
Identify the most important component of a disaster recovery plan below.
A) Documentation.
B) Operating instructions.
C) Periodic testing.
D) On-site and off-site storage.
Clemente Santiago has formed a business that sells carved gourmet coconuts. He has
hired five employees. The most senior is Mary, who manages the carving process. Jane
is the newest employee. She collects the coconuts. Joe takes calls from unhappy
customers. Tom tosses finished coconuts into the sea, sending them to the wholesaler.
Annie sends letters to the wholesaler extolling the virtues of the latest production run of
nuts that are drifting across the bay.
Which of the following functions in the value chain is Joe performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
Program design
A) spans all five stages of the system development life cycle.
B) includes writing computer code.
C) includes debugging logic errors.
D) is described by all the above.
page-pf9
Refer to the diagram below, where the numbers next to the arrows refer to the number
of days required for completion of the corresponding activity. What is the critical path?
A) A-B-D-F
B) A-C-E-F
C) A-B-D-E-F
D) A-C-B-D-F
E) A-C-B-D-E-F
The management at Barks-a-Million is considering a new inventory control system. The
current system is inadequate because it frequently causes stockouts that interrupt
production and lead to excess stock of other materials — resulting in markdowns and
high carrying costs. The new system will focus on reducing or completely eliminating
carrying costs, most likely employing
A) a just-in-time inventory system.
B) a reorder point.
C) materials requirements planning.
D) the economic order quantity.
An AIS that makes information more easily accessible and more widely available is
likely to increase pressure for
page-pfa
A) centralization and defined procedures.
B) centralization and autonomy.
C) decentralization and defined procedures.
D) decentralization and autonomy.
According to The Sarbanes-Oxley Act of 2002, the audit committee of the board of
directors is directly responsible for
A) hiring and firing the external auditors.
B) performing tests of the company's internal control structure.
C) certifying the accuracy of the company's financial reporting process.
D) overseeing day-to-day operations of the internal audit department.
Data diddling is
A) verifying credit card validity; buying and selling stolen credit cards.
B) inserting a sleeve into an ATM so that it will not eject the victim's card, pretending to
help the
victim as a means of obtaining his PIN, and using the card and PIN to drain the account.
C) a technique that tricks a person into disclosing confidential information.
D) changing data before, during, or after it is entered into the system in order to delete,
alter, or add key system data.
The general ledger and reporting system consists of the ________ involved in
________ the general ledger and ________ reports.
page-pfb
A) business transactions; updating; processing
B) data processing; business transactions for; printing
C) information processing; updating; creating
D) business transactions; data processing; preparing

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.