CIS 19738

subject Type Homework Help
subject Pages 9
subject Words 1031
subject Authors Mark G. Simkin

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which of the following is not a part of a form?
a) A heading section
b) A detail section
c) A design section
d) A navigation bar
Answer:
Which type of company is most likely to use MICR?
a) Grocery store
b) Bank
c) Phone company
d) Web site seller
Answer:
Within a database context, the relationship between "president" and "vice president"
would most likely be:
a) One-to-one
page-pf2
b) One-to-many
c) Many-to-one
d) Many-to-many
Answer:
The term 'spoofing" refers to:
a) Computer hijacking
b) Kidding
c) Posing as a legitimate computer user
d) Distributing junk mail
Answer:
Assume that your manager has asked you to prepare a budget for your firm using data
stored in an Access database. The best approach for creating the budget would be to use
a:
a) Table
b) Query
page-pf3
c) Form
d) Report
e) SQL
Answer:
Which of these statements best describes the relationship between "AISs" and
"countering terrorism?"
a) These are completely independent items; there is no relationship
b) AISs can help counter terrorism using data warehouses
c) AISs can help by denying financial aid to terrorist groups
d) AISs can help by identifying international embezzlers
Answer:
An important characteristic of E-wallets is:
a) It is exactly the same as regular cash
b) It is the same as EDI
page-pf4
c) It contains the identity of the user
d) Users must also supply a credit card number when using it
Answer:
The master inventory file, contained on a removable magnetic disk, was destroyed by a
small fire next to the area where it was stored. The company had to take a special
complete inventory in order to reestablish the file. The best control procedure would be:
a) Fire insurance
b) Data processing insurance
c) A copy of the disk
d) Remote storage of a copy of the disk and the transactions since the disk was copied
Answer:
Which of these would be an example of "denial-of-service" computer abuse?
a) Computer virus
b) Salami technique
c) Trojan horse computer program
page-pf5
d) Embezzlement using computerized data
e) none of these
Answer:
A bar code reader is most likely to be used by which type of system?
a) POS system
b) MICR system
c) Printer/scanner system
d) Fax machine system
Answer:
The term "test data" is associated with:
a) Auditing through-the-computer
b) Auditing around-the-computer
c) Auditing of manual accounting systems
d) Non-auditing procedures performed by a firm's accounting subsystem employees
page-pf6
Answer:
Data transcription in AISs is labor intensive and is prone to introduce errors into
accounting data.
Answer:
An example of an Internet service provider is:
a) General Electric
b) AOL
c) PeachTree
d) ISP
e) none of these
Answer:
page-pf7
Once all facts and data have been collected in the systems survey, this activity can
begin:
a) The preliminary investigation
b) Appoint a steering committee
c) Perform the data analysis
d) Perform the systems implementation
Answer:
Which of the following is true about control totals?
a) Usually expressed in dollars
b) Batches normally occur in groups of 200 or more
c) Should "make sense" to be useful
d) none of the above
Answer:
The managerial accounting component of the accounting subsystem contains all but
page-pf8
which one of the following functions:
a) Cost accounting
b) Financial accounting
c) Budgeting
d) Systems study
Answer:
Principal output controls include all but one of the following:
a) Sequence tests of check stubs
b) Character control totals
c) Strict regulation of preprinted forms
d) all of the above
Answer:
An example of a data type for a data field in the record of an Access table is "Text."
page-pf9
Answer:
A database is in first normal form if the data it contains is free of errors and outliers.
Answer:
It is not necessary for data to be "clean" or accurate if they are stored in a data
warehouse.
Answer:
Data field masks help prevent users from entering incorrect value entries.
Answer:
page-pfa
Answer:
In the last 100 years, only about 20 people have been found with identical fingerprints.
Answer:
Mashups are web pages that can combine the data from two or more sources.
Answer:
It is best to view an AIS as an accounting system that must be computerized.
page-pfb
Answer:
The Sarbanes-Oxley Act prohibits companies from using the same auditing firms for
performing both auditing and management consulting services.
Answer:
An example of a "one-to-one" relationship is "employee to assigned parking stall."
Answer:
A "DVD" disk is read magnetically.
Answer:
page-pfc
The members of a systems study team should be from the same discipline or area so
that they can work together well.
Answer:
A database is in first normal form if all of its record's data fields are well defined and
the information can thus be stored as a flat file.
Answer:
The bill of materials lists the types and quantities of parts needed to assemble each unit
of product.
Answer:
page-pfd
The acronym BPR stands for "business process reengineering."
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.