MIS 42779

subject Type Homework Help
subject Pages 14
subject Words 1697
subject Authors Mark G. Simkin

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which of the following best describes documents initially prepared by a company, then
sent to individuals, and returned to an organization for data processing?
a) Mark-sense media
b) Source documents
c) Turnaround documents
d) MICR documents
Answer:
Which of these is the official website of the XBRL International Consortium?
a) www.xbrl.com
b) www.xbrl.org
c) www.xbrl.gov
d) www.xbrlic.com
Answer:
All of these are business advantages of social media except:
a) Increase organization recognition
page-pf2
b) Evaluate customer reactions to new goods or services
c) Enable accountants to communicate with one another on projects
d) Manage strong reactions to firm missteps early
e) all of these are business advantages of social media
Answer:
A virtual private network (VPN):
a) Is a security appliance that runs behind an organization's firewall
b) Allows remote users to access entity resources by using wireless, hand-held devices
c) Is security software that is specifically designed to protect hard-wired local area
networks (LANs)
d) both (a) and (b)
e) none of the above
Answer:
When Access links records to one another in different tables, the foreign key in one
record refers to the _______ in another record.
page-pf3
a) Primary key
b) Secondary key
c) Foreign key
d) Linkage key
Answer:
Most AISs perform all of these functions except:
a) Collect raw accounting data
b) Store accounting data for future uses
c) Process data into useful information
d) AISs perform all of these functions
Answer:
Which of the following is not a common way to steal personal identity information?
a) Altering computer records
b) Using key logging software
page-pf4
c) Dumpster diving
d) Phishing
Answer:
The Format menu in Access allows users to:
a) Resize objects
b) Edit objects
c) Align objects
d) all of the above
Answer:
All of the following are things that might go wrong when implementing a new system
except:
a) An untested system is installed anyway
b) Complete documentation is lacking
c) Not enough resources are allocated for subsequent maintenance
page-pf5
d) all of these are common missteps in systems implementation
Answer:
Which of the following business processes or functions is unlikely to be part of an
enterprise system?
a) Accounting/financing
b) Human resources
c) Manufacturing
d) Sales or distribution
e) all of the above are likely to be included in an enterprise system
Answer:
Managerial accounting principally provides information to:
a) Stockholders
b) Government regulators (e.g., SEC, Federal bank examiners)
c) Internal company management
d) Potential creditors
page-pf6
Answer:
The "X" in the term XBRL stands for:
a) Extra
b) Extensible
c) X-rated
d) Exante
Answer:
When companies outsource business processes to other countries, such as India, and the
Philippines, it is often the case that workers in those countries:
a) Gain job prestige
b) Enjoy a better quality of life
c) Have higher income
d) all the above
Answer:
page-pf7
Which of the following is not a sign that indicates the need for a new AIS?
a) A new vendor has just announced an AIS package with several features your system
does not have
b) A slowdown in inventory turnover
c) The owner is concerned about cash flows and profitability
d) It takes longer to collect on receivables
e) It takes longer to close the books
Answer:
An advantage of an extranet is that:
a) It can disseminate information corporate-wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in them
d) all of the above
Answer:
page-pf8
A school administrator wishes to select the names of all students who have taken at
least 130 units of credit at your university to see if they qualify for graduation. Which
of these is the best type of query to use for this task?
a) Append query
b) Update query
c) Make table query
d) Select query
e) Make report query
Answer:
The Cougar Mountain Fund Suite is accounting software designed for:
a) Small businesses with less than $1 million in revenues
b) Manufacturing concerns with between $1 million and $5 million in revenues
c) Retail furniture stores
d) Charities
Answer:
page-pf9
Document flowcharts use the following symbol to show movement of goods:
a) Pickup truck
b) Wheelbarrow
c) Hand truck
d) any of the above
Answer:
Within the context of the chapter on IT, which of these is not an acronym?
a) ppm
b) byte
c) pixel
d) CD-ROM
e) all of these are acronyms
Answer:
page-pfa
Within a database context, the relationship between "military officer" and "private"
would most likely be:
a) One-to-one
b) One-to-many
c) Many-to-one
d) Many-to-many
Answer:
The UPC code is an example of a(n):
a) PDA
b) MICR
c) Bar code
d) Biometric input
Answer:
The principal function of an accounting system's computerized controls is:
a) Detecting computer frauds
page-pfb
b) Preventing computer frauds
c) Encouraging programmer honesty
d) none of the above
Answer:
The primary purpose of an internal audit is:
a) To verify the accuracy of a firm's financial statements
b) To punish employees for inefficient performance
c) To meet the requirements of the accounting profession
d) To ascertain employee adherence to organizational policies and procedures
Answer:
All of the following are examples of EDI "documents" except:
a) Purchase orders
b) Sales invoices
c) Customs documents
page-pfc
d) Bar codes
Answer:
Which of these is a desirable guideline to follow when creating queries with Microsoft
Access?
a) Spell accurately
b) Don't worry about capitalization
c) Join each table at least twice to ensure their connectivity
d) Name each query you create "Query"
Answer:
In the REA framework, which of these would be recorded as an "event?"
a) Hiring a new president of the company
b) Taking an initial sales order from a customer
c) Buying a piece of equipment for cash
d) all of these would be recorded as events
page-pfd
Answer:
One of the most effective deterrents to prevent/discourage computer hacking is:
a) User education, that is, making potential hackers aware of the ethical issues involved
in this sort of behavior
b) The USA Patriot Act of 2001
c) The Cyber Security Act of 1987
d) none of the above
Answer:
All of the following are controls for end-user computing except:
a) Formally evaluate large projects
b) Formalize documentation standards
c) Limit the number of employees authorized to create end-user applications
d) all of the above are important controls
Answer:
page-pfe
The purpose of ________________ is to identify organizational risks, analyze their
potential in terms of costs and likelihood of occurrence, and install those controls
whose projected benefits outweigh their costs.
a) Internal controls
b) A control environment
c) Risk assessment
d) Management consultants
Answer:
This is a common method for reviewing a company's internal control procedures:
a) Use an informant
b) Consult historical records
c) Get top management's opinions
d) Use internal control questionnaires
Answer:
page-pff
Which of the following is considered an integrated software system?
a) Material requirements planning systems (MRP I)
b) Manufacturing resource planning systems (MRP II)
c) Enterprise resource planning systems (ERP)
d) all of the above
Answer:
The World Wide Web is the text portion of the Internet.
Answer:
Pivot tables are powerful statistical tools, but allow the user little flexibility in selecting
what data can be analyzed.
Answer:
page-pf10
The AIS for the health care industry is particularly complex due to third party billing.
Answer:
An advantage of cloud computing is that data are always obscured.
Answer:
EDI can only be used by private, for-profit businesses.
Answer:
page-pf11
A relational data structure should never be used for accounting systems.
Answer:
A two-digit alphabetic code has many more different combinations of symbols than a
numeric code.
Answer:
Process maps use circles and arrows as their primary symbols.
Answer:
Sections of the Patriot Act mandate suspicious activity reporting.
page-pf12
Answer:
Activity-based costing systems focus on allocating overhead on the basis of direct labor
hours used.
Answer:
An advantage of XBRL is its ability to express semantic meaningi.e., to express such
relationships as "assets = liabilities + equity."
Answer:
A good audit trail within the financial accounting system should allow a manager or
auditor to trace any source document back from a report to the original data entry.
Answer:
page-pf13
An example of a source document is an employee time card.
Answer:
The production process is only present in service organizations.
Answer:
The Electronic Systems Assurance and Control model provides a framework for
evaluating controls over email systems.
Answer:
page-pf14
Answer:
The acronym AIS stands for "Accounting Information Standards."
Answer:

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.