ACCT 347 Midterm

subject Type Homework Help
subject Pages 8
subject Words 1152
subject Authors Robert Hurt

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
SBL Corporation's accounting records were destroyed in a fire. In reconstructing them:
A. Human judgment will be important, but information technology will not.
B. Information technology will be important, but human judgment will not.
C. Both human judgment and information technology may be important.
D. Neither human judgment nor information technology will be useful.
Consider the following short case as you respond to the question:
Melissa is an internal auditor for the County of Bufflufia. Her job responsibilities
include providing training on information systems security and checking the work of
data entry clerks. Melissa is also part of a team that responds to denial-of-service
attacks on the county's information system. Her co-worker, Eugene, ensures that all the
county's computers have the most up-to-date antivirus software; he also enforces the
county's policy of backing up sensitive data, such as employee social security numbers
and other payroll information, at least once a day. The back-ups are dated and stored in
a locked filing cabinet.
Which employee has responsibilities related to all three elements of the CIA triad?
A. Melissa only
B. Eugene only
C. Both Melissa and Eugene
D. Neither Melissa nor Eugene
page-pf2
Accounting information systems have five basic elements. Which of the following
would be associated with the human resource process?
A. Payroll transactions
B. Performance evaluations
C. Both payroll transactions and performance evaluations
D. Neither payroll transactions nor performance evaluations
Which of the following is most likely to be represented with a rectangle in a data flow
diagram?
A. Customer file
B. Bank
C. Deposited checks
D. Any of these
Omar is a general manager at FRD Corporation. He recently attempted to reorganize
FRD from three departments of ten people each to six departments of five people each.
Which purpose of internal control is most likely to be impacted by the change?
A. Safeguarding assets
B. Ensuring financial statement reliability
page-pf3
C. Promoting operational efficiency
D. Uncovering fraud
Which of the following pieces of data would you expect to find in an event-driven AIS,
but not in a view-driven AIS?
A. Accounts to debit
B. Accounts to credit
C. Details about customer preferences for product color
D. All of these
COBIT's principles include the need to separate governance from management. Based
on Carter's taxonomy, which types of computer crime are most likely to occur if
governance and management are not separated?
A. target and instrumentality
B. incidental and associated
C. target and associated
D. Cannot be determined from the information given
page-pf4
Consider the following REA model as you answer the question:
Which of the following would be foreign keys in the "purchase inventory" table?
A. Supplier ID
B. Employee ID
C. Both supplier ID and employee ID
D. Neither supplier ID nor employee ID
The balance sheet of BYA Corporation reported bonds payable with a book value of
$500,000 and total paid-in capital of $300,000. The balance sheet of LCA Corporation
reported bonds payable with a book value of $600,000 and total paid-in capital of
$250,000. Which of the following statements is most true?
A. BYA's exposure to liquidity risk is greater than LCA's exposure.
B. BYA's exposure to liquidity risk is less than LCA's exposure.
C. BYA and LCA have equal exposure to liquidity risk.
page-pf5
D. None of these statements is true.
Fill in the blanks below based on the weaknesses of view-driven AIS described in the
text.
a. They focus on a very small, well-defined group of important ___.
b. They often process data in ___, frequently at the ___.
c. The data in a view-driven AIS are often ___ because of when they are processed.
d. The system captures a very limited set of data: ___, ___ and ___.
e. Data in a view-driven system are highly ___ and stored in ___.
f. In view-driven systems, the ___ process is often protective and expensive.
page-pf6
Liam had developed a good process for safeguarding his company's information
technology assets, but had not shared it with anyone else in the company. To move the
process up one level in the capability maturity model, Liam should:
A. Ensure the process actually uses information technology.
B. Create a timeline with specific targets.
C. Patent his idea.
D. Verify his model against COSO's internal control framework.
Big Data can originate:
A. from inside a company only.
B. from outside a company only.
C. either inside or outside a company.
D. only from the accounting information system.
Which of the following statements best represents an advantage of using the systems
development life cycle?
page-pf7
A. It is less expensive than other systems development methodologies.
B. It requires the least amount of time.
C. It can help promote operating efficiency.
D. All of these are advantages of the SDL
C.
The generic elements of an AIS include inputs and outputs. Which of the following
statements about them is most true?
A. Inputs should be paper-based; outputs should be electronic.
B. Outputs should be paper-based; inputs should be electronic.
C. If inputs are paper-based, outputs should also be paper-based.
D. If inputs are electronic, outputs could be either paper-based or electronic.
Documents involved in a business process should have a clear termination. Which of
the following best applies that principle?
A. An arrow connecting a document with a filing symbol
B. A document moving between columns in a flowchart
C. Both an arrow connecting a document with a filing symbol and a document moving
between columns in a flowchart
page-pf8
D. Neither an arrow connecting a document with a filing symbol nor a document
moving between columns in a flowchart
The US Department of State provides information on its web site for US citizens
traveling to other countries and for citizens of other countries traveling to the US.
Which of the following statements is most true?
A. The US Department of State is not engaged in e-business because it does not sell the
information.
B. The US Department of State is not engaged in e-business because it provides
information to non-citizens.
C. The US Department of State is engaged in G2B e-business.
D. The US Department of State is engaged in G2C e-business.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.