ACCT 32119

subject Type Homework Help
subject Pages 9
subject Words 1443
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Regularly reviewing an accounts receivable aging report can help management do
what?
A) identify customers who have not purchased anything lately
B) determine whether changes are needed in the firm's credit policies
C) improve the speed which customers make payments
D) determine whether the firm's pricing policy is effective
Ashley Baker has been the webmaster for Berryhill Finance only ten days when she
received an e-mail that threatened to shut down Berryhill's website unless Ashley wired
payment to an overseas account. Ashley was concerned that Berryhill Finance would
suffer huge losses if its website went down, so she wired money to the appropriate
account. The author of the e-mail successfully committed
A) a denial-of-service attack.
B) Internet terrorism.
C) hacking.
D) cyber-extortion.
A computer operator accidentally used the wrong master file when updating a
transaction file. As a result, the master file data is now unreadable. Which control could
best have prevented this from happening?
A) Header record.
B) Validity check.
C) Trailer record.
D) Parity check.
page-pf2
A specialized journal would be most likely to be used to enter
A) sales transactions.
B) monthly depreciation adjustments.
C) annual closing entries.
D) stock issuance transactions.
Illegally obtaining and using confidential information about a person for economic gain
is known as
A) eavesdropping.
B) identity theft.
C) packet sniffing.
D) piggybacking.
What is the second step in the data processing cycle?
A) Input.
B) Output.
C) Storage.
D) Processing.
The question of what the project should and should not accomplish is determined in
what step of systems analysis?
A) Feasibility study.
B) Initial investigation.
page-pf3
C) Systems analysis report.
D) Systems survey.
Adjusting entries that are made to reflect differences between the actual and recorded
value of an asset or a change in accounting principle are called
A) reconciliations.
B) revaluations.
C) estimates.
D) accruals.
Lauren Smith was relaxing after work with a colleague at a local bar. After a few
drinks, she began expressing her feelings about her company's new control initiatives. It
seems that as a result of controls put in place by the company, she now has to be more
creative in solving problems and avoiding actions that might have a negative effect on
her company's reputation. The level of control that the company is using in this case is
a(n)
A) boundary system.
B) diagnostic control system.
C) interactive control system.
D) belief system.
A fraud technique that uses unauthorized codes in an authorized and properly
functioning program is called the ________ technique.
page-pf4
A) Trojan horse
B) man-in-the-middle
C) salami
D) trap door
What is the first step a company should take when evaluating requests for proposals?
A) Carefully compare proposals against the proposed AIS requirements.
B) Determine how much of a given proposal meets the desired AIS requirements.
C) Eliminate proposals that are missing important information or fail to meet minimum
requirements.
D) Invite vendors to demonstrate their systems.
The ________ describes what a system will consist of, how it will be developed, who
will develop it, when it will be developed, how needed resources will be acquired, the
status of projects in process, the prioritization of planned projects, and the prioritization
criteria.
A) master plan
B) project development plan
C) systems analysis plan
D) implementation plan
The legitimacy of customer orders is established by ________ in Internet-based
customer orders.
page-pf5
A) digital signatures
B) the customer's pin number
C) the customer's credit card number
D) prior experience with the customer
Identify the system below that is likely to be most appropriate for end-user
development.
A) An accounts receivable system.
B) A general ledger system.
C) An inventory system.
D) A system that helps with sensitivity analysis.
Record layouts, definitions, addresses, and indexes will be stored at the ________ level
schema.
A) external
B) conceptual
C) internal
D) meta
Software that interprets a program's source code and generates a flowchart of the
program's logic is called
A) automated flowcharting programs.
B) automated decision table programs.
page-pf6
C) mapping programs.
D) tracing program.
An auditor sets an embedded audit module to flag all credit transactions in excess of
$5,000. The flag causes the system state to be recorded before and after each transaction
is processed. The auditor is using
A) audit hooks.
B) an integrated test facility.
C) the snapshot technique.
D) a system control audit review file.
MRP-II is to MRP, as lean manufacturing is to
A) EOQ.
B) JIT.
C) push manufacturing.
D) reorder point.
Which is probably the most immediate and significant effect of database technology on
accounting?
A) Replacement of the double entry-system.
B) Change in the nature of financial reporting.
C) Elimination of traditional records such as journals and ledgers.
D) Quicker access to and greater use of accounting information in decision-making.
page-pf7
The Gwallter Reece Chihuahua Sweater Co. (GRCCo) was established in 2013. It
recently signed a large contract with PetCo pet stores. GRCCo will be required to track
and forecast sweater sales by linking in to PetCo's sales database. GRCCo will then be
responsible for shipping products to PetCo as needed. The relationship between GRCCo
and PetCo is an example of
A) sales force automation.
B) electronic data interchange.
C) optical character recognition.
D) vendor-managed inventory.
Supplier number is least likely to be a foreign key in
A) Order Inventory.
B) Disburse Cash.
C) Receive Inventory.
D) Warehouse.
In a relational database designed according to the REA model, where is information
about accounts receivable stored?
A) Event entities.
B) Agent entities.
C) Both A and B.
D) None of the above.
page-pf8
Cancellation and storage of documents means
A) documents are defaced and stored.
B) documents are defaced before being shredded.
C) cancellation data are copied from documents before they are stored.
D) data are copied from a document and stored before it is being shredded.
Suppose an organization is interested in knowing whether the system can be developed
and implemented in the time allotted. Where should this requirement be considered in a
feasibility study?
A) Economic feasibility.
B) Scheduling feasibility.
C) Operational feasibility.
D) Technical feasibility.
Which of the following controls can minimize the threat of inaccurate time and
attendance data?
A) Redepositing unclaimed paychecks and investigating cause.
B) Issuing earnings statements to employees.
C) Using biometric authentication.
D) Conducting criminal background investigation checks of all applicants for finance
related positions.
page-pf9
In the data flow diagram below, inventory is a
A) data store.
B) data source.
C) data flow.
D) data source and destination.
Build Smarts is a supplier of building materials to more than 150 builders in the state of
Illinois. What is the best way for Build Smarts to ensure that all sales are recorded?
A) well-designed paper forms
B) source data automation
C) turnaround documents
D) sequentially numbered sales invoices
page-pfa
Arranging delivery of products to customers constitutes ________ in value chain
analysis.
A) shipping
B) inbound logistics
C) outbound logistics
D) delivery
All of the following are associated with asymmetric encryption except
A) speed.
B) private keys.
C) public keys.
D) no need for key exchange.
Ashley Baker has been the webmaster for Berryhill Finance only ten days when
Berryhill's website was flooded with access attempts. Ashley shut down the site and
only opened it to Web addresses which she specifically identified as legitimate. As a
result, many of Berryhill's customers were unable to obtain loans, causing Berryhill to
lose a significant amount of business. Berryhill Finance suffered from a
A) denial-of-service attack.
B) zero-day attack.
C) phreaking attack.
D) cyber-extortion attack.
page-pfb
A listing of journal vouchers by numerical sequence, account number, or date is an
example of
A) a general ledger control report.
B) a budget report.
C) a batch to be processed.
D) responsibility accounting.
The project committee for ALDI corporation just finished evaluating the design
alternatives for a new, organization-wide accounting information system and has
selected a design. Now, the project committee needs to create conceptual design
specifications for which of the following elements below?
A) Output.
B) Data storage.
C) Processing and operations.
D) All of the above.
A report of income paid to independent contractors is called
A) form W-2.
B) form W-3.
C) form 1099-Misc.
D) form 941.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.