Acc 45097

subject Type Homework Help
subject Pages 9
subject Words 1425
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The expenses associated with disposal of defective products are ________ costs.
A) prevention
B) inspection
C) internal failure
D) external failure
Identify the statement below which is true.
A) Cloud computing is a control technique for system availability.
B) Cloud computing eliminates the need for backup of applications and data.
C) Cloud computing eliminates the need for companies to own their own software and
servers.
D) Cloud computing refers to the practice of storing application files and backup data
on satellites "in the clouds."
Use the chart below to answer the following questions regarding flow chart symbols.
Which symbol would be used in a flowchart to represent a payroll master file kept on
magnetic tape?
A) #4
B) #7
C) #8
page-pf2
D) #11
Which of the following controls can minimize the threat of failure to bill?
A) Separation of billing and shipping functions.
B) Use of cash registers.
C) Bar-code and RFID technology.
D) Restriction of access to master data.
Terrorists are an example of a(n) ________ threat.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) intentional acts (computer crimes)
In which of the following cases is the relationship between entities not implemented by
foreign keys?
A)
B)
page-pf3
C)
D)
Which element of design specification will help the project team find an efficient way
to collect data for preparing sales reports?
A) Data collection.
B) Input.
C) Output.
D) Processing procedures.
When seeking to verify how a system actually works, rather than how it should work.
The most useful approach is to
A) conduct interviews.
B) make observations.
C) distribute questionnaires.
D) read system documentation.
Which or the following does not typically cause outsourcing failures?
A) Lukewarm company buy-in.
page-pf4
B) Blind imitation of competitors.
C) Ill-defined outsourcing agreements.
D) Downsizing.
Which one of the following results corresponds to the query below?
A)
B)
C)
page-pf5
D)
Which of the controls below would be least effective at preventing a company from
ordering goods at a price higher than market?
A) Only place orders with vendors on an approved vendor list.
B) Variance analysis of actual expenses to budgeted expenses
C) For high-dollar goods, solicit competitive bids from possible vendors.
D) Frequent review of, and update to, vendor price lists stored in the AIS
Which of the following diagrams represents a situation where a firm offers some
services that have not ever been sold, offers other services that have been performed
many times, and provides services sometimes performed together to clients?
A)
B)
page-pf6
C)
D)
Physical input design considerations include
A) which transactions to enter.
B) layout of source documents.
C) types of data input and optimal input methods.
D) cost of collecting and storing data.
The unauthorized use of special program that bypass regular system controls to perform
illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
page-pf7
The ________ method of gathering information helps to determine how a system
actually works.
A) interview
B) observation
C) questionnaire
D) system documentation
Which of the following tasks are facilitated by maintaining a strong and secure audit
trail?
A) Tracing a transaction from original source document to the general ledger to a
report.
B) Tracing an item in a report back through the general ledger to the original source
document.
C) Tracing changes in general ledger accounts from beginning to ending balances.
D) All of the above are facilitated by the audit trail.
The shipping department at Eka Toys follows policies that determine which carrier will
deliver orders according to the size, weight, and destination of the shipment. It
maintains standing agreements with shippers that specify legal responsibility for the
shipment while it is in transit. The terms of the shipping agreements are documented on
A) picking tickets.
B) packing slips.
C) bills of lading.
D) RFID tags.
page-pf8
Identify the detective control below.
A) Reconciling the bank statement to the cash control account.
B) Approving customer credit prior to approving a sales order.
C) Maintaining frequent backup records to prevent loss of data.
D) Ensuring that the employee who records cash received from customers does not also
have access to the cash itself.
What control are zero balance tests an example of?
A) Data entry controls.
B) Output controls.
C) Processing controls.
D) Source data controls.
Data must be converted into information to be considered useful and meaningful for
decision making. There are seven characteristics that make information both useful and
meaningful. If the same information can be reproduced by two independent and
knowledgeable people, it is representative of the characteristic of
A) reliability.
B) relevance.
C) verifiability.
D) truthful.
Deciding how often a certain report should be provided to users is part of which
page-pf9
conceptual design specification element?
A) Data storage.
B) Input.
C) Output.
D) Processing procedures and operations.
Which of the following is not a basic principle of the COSO ERM framework?
A) Companies are formed to create value for society.
B) Management must decide how much uncertainty it will accept to create value.
C) Uncertainty results in risk.
D) Uncertainty results in opportunity.
According to your textbook, what percentage of outsourcing agreements have been
described as failure or as major disappointments?
A) 5% - 10%.
B) 10% - 25%.
C) 25% to 50%.
D) Great than 50%.
An AIS provides value by
A) improving products or services through information that increases quality and
reduces costs.
B) providing timely and reliable information to decision makers.
page-pfa
C) creating new products.
D) both A and B
In recent years, many of the attacks carried out by hackers have relied on this type of
vulnerability in computer software.
A) Code mastication.
B) Boot sector corruption.
C) URL injection.
D) Buffer overflow.
What is a SQL injection attack?
A) It is an attack when the perpetrator is inserting malicious query in input such that it
is passed to and executed by an application program.
B) It is an attack when the perpetrator is inputting so much data that the input buffer
overflows. The overflow contains code that takes control of the company's computer.
C) It is an attack when the perpetrator uses software to guess company's addresses, send
employees blank e-mails, and add unreturned messages to spammer e-mail list.
D) It is an attacked when the perpetrator sends hundreds of messages from randomly
generated false addresses, overloading an Internet service provider's e-mail server.
Identify one potential drawback in the design and implementation of database systems
for accounting.
A) Double-entry accounting relies on redundancy as part of the accounting process, but
page-pfb
well-designed database systems reduce and attempt to eliminate redundancy.
B) Relational DBMS query languages will allow financial reports to be prepared to
cover whatever time periods managers want to examine.
C) Relational DBMS provide the capability of integrating financial and operational
data.
D) Relational DBMS can accommodate multiple views of the same underlying data;
therefore, tables storing information about assets can include data about both historical
and replacement costs.
Most processes on a DFD can be identified by
A) data in-flows only.
B) data out-flows only.
C) data flows both into or out of a process.
D) always being followed by a data store.
Data about which of the following facets of a business activity is most likely to be
recorded in a transaction file?
A) business activity
B) resources affected by the business activity
C) people who participate in the business activity
D) place the business activity occurs
In which transaction cycle would information for inventory purchases be most likely to
page-pfc
pass between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Identify the report below that does not have a pre-specified content and format design.
A) Demand reports.
B) Scheduled reports.
C) Special-purpose analysis reports.
D) Triggered exception reports.
Which of the following is a one-time event that can yield dramatic performance
improvements?
A) Business process reengineering (BPR).
B) Business process management (BPM).
C) Business process innovation (BPI).
D) Business process diagramming (BPD).

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.