SMG AC 41079

subject Type Homework Help
subject Pages 9
subject Words 1421
subject Authors Marshall B. Romney, Paul J. Steinbart

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The project development committee for Photomat Incorporated is discussing output
design alternatives for a new, organization-wide accounting information system. There
is a heated debate among the team regarding which departments should be given the
quarterly sales report. Mark prefers that only management and accounting receive the
report, while Jan prefers that management, accounting, and the sales departments
receive the report. What output design consideration is the team debating?
A) Use.
B) Medium.
C) Format.
D) Location.
Since the same inventory items may be stored in several different warehouses, the
maximum cardinality from Inventory to Warehouse is most likely
A) 0.
B) N.
C) 1.
D) M.
An invoice is prepared from the sales file and the shipping file, both of which are stored
on a hard drive. Which one of the following diagrams represents this activity?
A)
B)
page-pf2
C)
D)
Suppose an organization is interested in knowing whether the system can be developed
and implemented using existing technology. Where should this requirement be
considered in a feasibility study?
A) Economic feasibility.
B) Scheduling feasibility.
C) Operational feasibility.
D) Technical feasibility.
page-pf3
Identify one potential outcome of the update anomaly.
A) inconsistent data
B) inability to add new data
C) unintentional loss of data
D) none of the above
The threat of loss of data exposes the company to
A) the loss of assets.
B) ineffective decision making.
C) inefficient manufacturing.
D) All of the above are correct.
Which type of audits can detect fraud and errors?
A) External audits.
B) Internal audits.
C) Network security audits.
D) all of the above
Which of the following data entry controls would not be useful if you are recording the
checkout of library books by members?
A) Sequence check.
B) Prompting.
C) Validity check.
page-pf4
D) Concurrent update control.
Which of the following is the easiest method for a computer criminal to steal output
without ever being on the premises?
A) dumpster diving
B) use of a Trojan horse
C) using a telescope to peer at paper reports
D) electronic eavesdropping on computer monitors
A change in an employee's hourly pay would be recorded in
A) the payroll master file.
B) a payroll transaction file.
C) the employee master file.
D) the employee transaction file.
Data about actual raw materials used in production is most appropriately stored which
of the entities below?
A) Finished Goods.
B) Raw Materials.
C) Raw Materials Issuance.
D) Work-in-Process.
page-pf5
The textbook explicitly identifies ________ as situation where a properly designed
database can yield tax benefits.
A) meal and entertainment expenses
B) salary expenses
C) travel expenses
D) depreciation expenses
________ copies all changes made since the last full backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup
In order to reduce resistance resulting from uncertainty, what guideline should be
implemented and followed during the systems development process?
A) Attempt to meet the users' needs.
B) Avoid confrontation.
C) Keep communication lines open.
D) Keep cost down.
page-pf6
Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a
new computer program for Healtheast. As part of the testing process, Abbie needs to
use realistic patients data to ensure that the system is working properly. To protect
privacy, management at Healtheast uses a program that replaces private patient
information with fake values before sending the data to Abbie for testing. The program
that replaces patient information with fake values is called
A) data encryptioning.
B) data masking.
C) data wiping.
D) data redacting.
Congress passed this federal law for the purpose of preventing financial statement
fraud, to make financial reports more transparent and to strengthen the internal control
of public companies.
A) Foreign Corrupt Practices Act of 1977
B) The Securities Exchange Act of 1934
C) The Sarbanes-Oxley Act of 2002
D) The Securities Exchange Act of 1933
Carmie Iria, the director of a systems project committee, has received management
approval for the implementation of a new accounting information system. After sending
out an RFP to multiple vendors, the committee settled on purchasing a system from
Optibase, a vendor who will provide the company with all of the required hardware and
software. Carmie's committee has opted to purchase
A) canned software.
B) a turnkey system.
C) an outsourced system.
D) cloud computing.
page-pf7
Using a small device with storage capacity (iPod, Flash drive) to download
unauthorized data from
a computer is called
A) masquerading.
B) bluebugging.
C) eavesdropping.
D) podslurping.
Identify the inventory valuation method below that cannot be calculated in a database
created using an REA modeling approach.
A) LIFO.
B) FIFO.
C) Weighted Average.
D) none of the above
Which of the following is a redundant entity that would be merged when two cycles are
combined?
A) Customer.
B) Employee.
C) Vendor.
D) Inventory.
page-pf8
The steps that criminals take to identify potential points of remote entry is called
A) scanning and mapping the target.
B) social engineering.
C) research.
D) reconnaissance.
A system that creates logs of all network traffic that was permitted to pass the firewall
and then analyzes those logs for signs of attempted or successful intrusions is called
A) log analysis.
B) intrusion detection systems.
C) continuous monitoring.
D) defense in depth.
COBIT 5 management practice APO01.08 stresses the importance of ________ of both
employee compliance with the organization's information security policies and overall
performance of business processes.
A) continuous improvement of
B) continuous reviewing
C) continuous monitoring
D) continuous auditing
________ is an authorized attempt by an internal audit team or an external security
consultant to attempt to break into the organization's information system.
page-pf9
A) Log analysis test
B) Intrusion test
C) Penetration test
D) Vulnerability test
Using embedded audit modules to continuously monitor transactions, collect data on
transactions with special audit significance, and store the data to later identify and
investigate questionable transactions is an example of
A) integrated test facility.
B) snapshot technique.
C) system control audit review file.
D) audit hooks.
Marking transactions with a special code, recording them and their master file records
before and after processing, and storing the data to later verify that all processing steps
were properly executed is an example of
A) integrated test facility.
B) snapshot technique.
C) system control audit review file.
D) audit hooks.
Which of the following is not a general threat to the revenue cycle?
A) inaccurate master data
page-pfa
B) loss of customers
C) poor performance
D) unauthorized disclosure of sensitive information
Every company can have more than one banking relationships, and each bank can have
a business relationship with more than one company. Thus, the cardinality that exists
between company and bank is
A) one-to-one.
B) one-to-many.
C) many-to-many.
D) many-to-none.
Sule Technologies installed a new production monitoring system that will reduce
system breakdowns by 35%. The new system will increase throughput by
A) increasing productive capacity.
B) increasing yield.
C) increasing productive processing time.
D) increasing all components of throughput.
In the database design approach known as normalization, the first assumption made
about data is
A) there is no redundancy in the data.
B) the delete anomaly will not apply since all customer records will be maintained
page-pfb
indefinitely.
C) everything is initially stored in one large table.
D) the data will not be maintained in 3NF tables.
a) What is the major cost driver in the purchasing function? b) Describe how
information technology can be used to control this cost driver.
Identify the item below that would be classified as an agent by the REA data model.
A) An IOU from a customer.
B) The customer.
C) A customer sale.
D) A loan from a vendor.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.