ACT 59373

subject Type Homework Help
subject Pages 9
subject Words 1535
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The primary objective of accounting is to
A) implement strong internal controls.
B) provide useful information to decision makers.
C) prepare financial statements.
D) ensure the profitability of an organization.
A workforce inventory report
A) is filed each quarter to reconcile monthly tax payments with total tax liability for the
quarter.
B) is used in preparing labor-related reports for government agencies.
C) is used for employee information and annual payroll reports.
D) is used to document compliance with applicable regulations.
The ________ is the basic building block of information systems planning.
A) master plan
B) project development plan
C) systems analysis plan
D) implementation plan
A query that extracts, for a given time period, all purchases for which there is no
corresponding disburse cash event will yield
A) a cash account ledger.
B) a credit sales journal.
page-pf2
C) an accounts receivable ledger.
D) an accounts payable journal.
Which of the following transactions is represented by the diagram below?
A) A lumber yard where customers may pay with cash for all purchases.
B) A buy-here-pay-here auto dealer where a car buyer sends monthly cash payments to
the dealer.
C) A consulting firm that offers a variety of consulting services to other businesses.
D) A department store that allows customers to carry a balance and to make installment
payments, if they choose.
The system objective concerned that system should be able to accommodate reasonable
requirement changes is known as
A) flexibility.
B) reliability.
C) timeliness.
D) usefulness.
The technique of using queries to investigate hypothesized relationships among data is
called
A) business intelligence.
page-pf3
B) online analytical processing.
C) data analysis.
D) data mining.
In which systems analysis step do analysts conduct an extensive study of the present
system to gain a thorough understanding of how it works?
A) Feasibility study.
B) Information needs and requirements.
C) Systems analysis report.
D) Systems survey.
Which of the following diagrams represents the cardinality pairs in a situation where
many people apply for a specific position, and some of the applicants have applied for
the position in the past?
A)
B)
C)
D)
page-pf4
The cost of a product liability claim can be classified as a(n)
A) prevention cost.
B) inspection cost.
C) internal failure cost.
D) external failure cost.
The cashier deposits checks for Benedek Incorporated and also prepares payments to
vendors. Of the following, who is best able to reconcile the bank statement to Benedek's
records on a regular basis?
A) cashier
B) internal audit department
C) treasurer
D) external auditor
In activity-based costing, expenses associated with the purchase of health care
insurance for employees are ________ overhead.
A) batch-related
B) product-related
C) company wide
D) expenditure-based
page-pf5
In the data flow diagram below, Shipping is a
A) data store.
B) data flow.
C) data source.
D) data destination.
A(n) ________ diagram graphically depicts a database's contents by showing entities
and relationships.
A) data flow
B) flowchart
C) entity-relationship
D) REA
page-pf6
Which of the following is not a method of identity theft?
A) Scavenging
B) Phishing
C) Shoulder surfing
D) Phreaking
The risks associated with over-production are likely of greatest concern to which
company below?
A) a cereal manufacturer
B) a manufacturer that produces designer clothing
C) a manufacturer of printer paper
D) a mailbox manufacturer
An accounting policy that requires a purchasing manager to sign off on all purchases
over $10,000 is an example of
A) general authorization.
B) specific authorization.
C) special authorization.
D) generic authorization.
page-pf7
Following is a context diagram for a current Payroll Processing System. a) Identify the
data sources and destinations, data flows, and transformation process marked by
question marks. b) What would you need to do to explode this diagram?
Classification of confidential information is the responsibility of whom, according to
COBIT5?
A) External auditor.
B) Information owner.
C) IT security professionals.
D) Management.
page-pf8
Tom Wilson is chairman of the Rare Car Club, where he maintains a database of
registered rare cars and their history. One table will store the model, make, vehicle
identification number, and other characteristics of all of the registered rare cars. Each
rare car is uniquely identified by a registration number. A second table will contain data
that link each rare car to its most recent estimated fair market value by means of their
registration numbers. The entities described by the first table are
A) rare cars.
B) estimated fair market value.
C) registration numbers.
D) vehicle identification numbers.
What is the minimum number of agents that must participate in each REA event?
A) 0
B) 2
C) 1
D) 3
In the ________ method of tracking accounts receivable, customers pay according to
the amount showing on their monthly statement and payments are applied against the
total account balance.
A) specific identification
B) open-invoice
C) balance forward
D) remittance advice
page-pf9
Test of a new system using real transactions to determine if user-developed acceptance
criteria are met are called
A) acceptance test.
B) operating tests.
C) processing of test transactions.
D) walk-throughs.
A completeness check is an example of a(n)
A) data transmission control.
B) output control.
C) processing control.
D) input control.
Ngai Nhung is the sales manager at Hung Technologies. At lunch with the company
CEO, Ngai proudly announced that he had received a ________ from a client. The
client had just requested a large quantity of components from Hung.
A) blanket purchase order
B) voucher
C) purchase order
D) purchase requisition
A disaster recovery plan typically does not include
A) scheduled electronic vaulting of files.
page-pfa
B) backup computer and telecommunication facilities.
C) a system upgrade due to operating system software changes.
D) uninterruptible power systems installed for key system components.
The most common input-related vulnerability is called the
A) softening attack.
B) hardening attack.
C) cross-site scripting attack.
D) buffering attack.
________ requires that all activities and the precedent and subsequent relationships
among them be identified.
A) A CASE diagram
B) A Gantt chart
C) A PERT diagram
D) A SDLC cycle
The largest differences between the COSO Integrated Control (IC) framework and the
COSO Enterprise Risk Management (ERM) framework is
A) IC is controls-based, while the ERM is risk-based.
B) IC is risk-based, while ERM is controls-based.
C) IC is required, while ERM is optional.
D) IC is more applicable to international accounting standards, while ERM is more
page-pfb
applicable to generally accepted accounting principles.
Traditionally, what did manufacturing firms use to track the amount of time a worker
spends on each specific task?
A) Job-time ticket.
B) Sign-in sheet.
C) Punch card.
D) RFID tags.
Clemente Santiago has formed a business that sells carved gourmet coconuts. He has
hired five employees. The most senior is Mary, who manages the carving process. Jane
is the newest employee. She collects the coconuts. Joe takes calls from unhappy
customers. Tom tosses finished coconuts into the sea, sending them to the wholesaler.
Annie sends letters to the wholesaler extolling the virtues of the latest production run of
nuts that are drifting across the bay.
Which of the following functions in the value chain is Jane performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
A business simulation game that is used by colleges and universities all over the world
page-pfc
has students submit decisions over the Internet. Decisions are stored online, processed
on the server, and then the results are stored online. They are then downloaded by
students in preparation for the next round. Which one of the following diagrams
represents this activity?
A)
B)
C)
D)
Use the chart below to answer the following questions regarding flow chart symbols.
Which symbol would be used in a flowchart to represent a general ledger?
A) #2
B) #1
C) #6
D) #11
page-pfd
The amount of risk a company is willing to accept in order to achieve its goals and
objectives is
A) inherent risk.
B) residual risk.
C) risk appetite.
D) risk assessment.
The relationship between the Rent Item and Return Item events is most likely 1:1 for all
except which of the following reasons?
A) A return must be for a rented item.
B) A rented item can only be returned once.
C) Rented items are accounted for separately.
D) All rented items must be returned.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.