All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
Program development is one of the most time consuming SDLC activities. The processes of discovering and eliminating program errors is known asa. Cleaningb. Debugging c. Delousingd. Fixing
Changing from an old system to a new one by terminating the old AIS when the new one is introduced, is referred to asa. Direct conversionb. Parallel conversionc. Phase-in conversiond. Pilot
What percentage should be allocated to testing, debugging, and rewriting software?a. 5%b. 20 to 30 %c. 40%d. 50%
Which of the following statements is true?a. The Gartner Group estimates that programming bugs not found until later in the SDLC cost 25% to 30% more to correct than if they had been found earlier
Which of the following describes the systems testing approach that uses real transactions and files rather than hypothetical ones?a. Walk-throughb. Processing of test transactionsc. Acceptance
Which of the following describes designing a program from the top-down to more detailed levels?a. Hierarchical program designb. Top-down program designc. Parallel program designd. Unstructured
What is the process of discontinuing an old system as soon as a new one is introduced?a. Direct conversionb. Parallel conversionc. Phase-in conversiond. Pilot conversion
The Butler Financing Company runs a mortgage brokerage business that matches lenders and borrowers. Table 4-14 lists some of the data that Butler maintains on its borrowers and lenders. The data are
The relational data model portrays data as being stored ina. Hierarchiesb. Tablesc. Objectsd. Files
Create a spreadsheet with the following columns:Plaintext characterASCII code (seven bits, binary number)First bitSecond bitThird bitFourth bitFifth bitSixth bitSeventh bitNumber of bits with value =
Create data validation rules in a spreadsheet to perform each of the following controls:a. Limit check—that values in the cell are less than 70b. Range check—that values in the cell are between
Adam Lauridsen received an anonymous notification from an employee of the factory where he’s working as an internal auditor. The note read that for several years there has been a fictitious
What is the four-step approach to internal control evaluation that provides a logical framework for carrying out an audit?a. Inherent risk analysisb. Systems reviewc. Tests of
Name the different types of internal audits. Explain how they differ from each other.
Which of the following procedures is NOT used to detect unauthorized program changes?a. Source code comparisonb. Parallel simulationc. Reprocessingd. Reprogramming code
Which of the following is a concurrent audit technique that monitors all transactions and collects data on those that meet certain characteristics specified by the auditor?a. ITFb. Snapshot
Which of the following is a computer technique that assists an auditor in understanding program logic by identifying all occurrences of specific variables?a. Mapping programb. Program
Which of the following is a computer program written especially for audit use?a. GASb. CATASc. ITFd. CIS
The focus of an operational audit is on which of the following?a. Reliability and integrity of financialb. All aspects of information systems managementc. Internal controls
A basic threat during sales order entry is that important data about the order will be either missing or inaccurate. Explain how this risk can be mitigated.
Find articles from the past year in the Journal of Accountancy, The New Accountant, and any other magazine suggested by your instructor that explain how CPA firms are using IT developments (e.g., the
Accounts Receivable would appear in an REA diagram as an example of which kind of entity?a. Resourcec. Agentb. Eventd. None of the above
Which of the following is NOT likely to be depicted as an entity in the REA data model?a. Customersb. Salesc. Invoicesd. Delivery trucks
In most cases, the relationship between agent entities and event entities isa. 1:1b. 1:Nc. M:Nd. 0:N
Which of the following most accurately models the sales of low-cost, mass-produced items by a retail store? a. b. C. d. Inventory Inventory Inventory Inventory K Sale Sale Sale Sale
The REA data model used to design AID databases does not contain information abouta. Resourcesb. Agentsc. Technical infrastructure
Data modeling occurs during which stages of database design?a. Systems analysis and physical designb. Systems analysis and conceptual designc. Conceptual design and implementation and
A company has five different cash accounts (checking, money market, petty cash, payroll, and investments). It deposits all payments received from customers into its checking account. Which of the
EZ Construction Company builds residential houses. It sells only homes that it built. Most of its homes are sold to individuals, but sometimes an investor may purchase several homes and hold them for
A business operates by always collecting payments for the entire amount of the sale from customers in advance. It then orders the items from its suppliers, and when they all arrive it ships the
Which of the following statements about the REA data model is true?a. Every event must be linked to at leastb. Every resource must be linked to atc. Every event must be linked to at least two
The value of information is the difference between the benefits realized from using that information and the costs of producing it. Would you, or any organization, ever produce information if its
IT is changing the nature of accounting and the role of accountants. Write a two-page report describing what you think will be the nature and the value of accounting function in a large company in
Data differ from information in which way?a. Data are output, and information is b. Information is output, and data arec. Data are meaningful bits of input. information.d. There is no difference.
The business processes that include goods storage, receiving vendor invoices, and updating payable accounts is calleda. The expenditure cycle. b. The revenue cycle.c. The production or conversion
Which of the following is a primary activity in the value chain?a. Purchasing b. Accountingc. Post-sales serviced. Human resource management
Which transaction cycle includes interactions between an organization and its suppliers?a. Revenue cycleb. Expenditure cyclec. Human resources/payroll cycled. General ledger and reporting system
Figure 1-4 shows that organizational culture and the design of an AIS influence one another. What does this imply about the degree to which an innovative system developed by one company can be
Which of the following is NOT a means by which information improves decision making?a. Increases informationb. Reduces uncertaintyc. Provides feedback about the overload effectiveness of prior
Figure 1-4 shows that developments in IT affect both an organization’s strategy and the design of its AIS. How can a company determine whether it is spending too much, too little, or just enough on
In the value chain concept, upgrading IT is considered what kind of activity?a. Primary activityb. Support activityc. Service activityd. Structured activity
Albert Heijn (or AH) is arguably the largest retail chain of Europe, owning supermarkets, convenience stores, and online shopping services in food and other goods. AH prides itself on establishing
When a subsystem’s goals are inconsistent with the goals of another subsystem, or with the system as a whole, it is calleda. Goal conflict.b. Goal congruence.c. Both definitions are wrong.
Which of the following is a function of an AIS?a. Reducing the need to identify a strategy and strategic positionb. Transforming data into useful informationc. Allocating organizational strategy
Transforming data into information so that management can plan, execute, control, and evaluate activities, resources, and personnel is part of which component of an AIS?a. The people who use the
A report telling how well all approved vendors have performed in the prior 12 months is information that is MOST needed in which business process?a. Paying vendorsb. Acquiring inventoryc. Selling
Which of the following is NOT a step in the data processing cycle?a. Data collectionb. Data inputc. Data storaged. Data processing
All of the information (name, GPA, major, etc.) about a particular student is stored in the samea. Fileb. Recordc. Attributed. Field
When items are numbered consecutively to account for all of them, and missing ones cause a gap in the sequence, it is aa. Sequence codeb. Block codec. Group coded. Mnemonic code
Your IT company deals in laptops, desktops, and servers. You also sell computer parts like harddrives and motherboards. Design a coding scheme for your company.
Which of the following is most likely to be a general ledger control account?a. Accounts receivableb. Petty cashc. Prepaid rentd. Retained earnings
Which of the following documents is most likely to be used in the expenditure cycle?a. Sales ordersb. Credit memoc. Receiving reportd. Job time ticket
The portion of a data record where the data value for a particular attribute is stored is calleda. An entityb. An attributec. A fieldd. A record
How does the chart of accounts list general ledger accounts?a. Alphabetical orderb. Chronological orderc. Size orderd. The order in which they appear in financial statements
Which of the following is NOT an advantage of an ERP system?a. Better access controlb. Standardization of procedures and reportsc. Improved monitoring capabilities d. Simplicity and reduced costs
Records of company data sent to an external party and then returned to the system as input are calleda. Turnaround documentsb. Source data automation documentsc. Source documentsd. External input
What kind of processing involves entering transaction data and editing them as they occur?a. Batch processingb. Online batch processingc. Online real-time processing
A DFD is a representation of which of the following?a. The logical operations performed by a computer programb. Flow of data in an organizationc. Decision rules in a computer program d. Computer
SoftData, a vendor, sends an invoice to Accuflow for data warehousing support services. The invoice is sent directly to Megan Waters, the accounts payable clerk, who manually records the invoice in
In the following narrative please identify the DFD elements: Henk buys a new bicycle at a local shop and pays with his debit card. The sales clerk enters the transaction in the cash register. At the
Documentation methods such as DFDs, BPDs, and flowcharts save both time and money, adding value to an organization.a. True b. False
At the Barsus steel factory, employees have to enter their working hours on data input terminals and the job code for each project they work on. They enter the starting time and the time they stop
In a data flow diagram, entities can be both a source and a destination.a. True b. False
Compare the guidelines for preparing flowcharts, BPDs, and DFDs. What general design principles and limitations are common to all three documentation techniques?
Which of the following flowcharts shows the relationship among the input, processing, and output in an information system?a. Document flowchartb. System flowchartc. Program flowchart
The following description represents the policies and procedures of a small charitable organization that grants subsidies to economically backward students in far-flung areas in China. The
Which of the following statements is true?a. COSO’s enterprise risk management framework is narrow in scope and is limited to financial controls.b. COSO’s internal control integrated framework
An employee database that consolidates payroll, personnel, and job skills master files is referred to asa. Data integration.b. Data sharing.c. Data independence.
What is each row in a relational database table called?a. Relationc. Anomalyb. Attributed. Tuple
The internal-level schema of a database system consists of an individual user’s view of portions of a database, also called a subschema.a. True b. False
C&A Company wants to store employee skill data. Each employee may possess one or more specific skills, and several employees may have the same skill. Include the following facts in the
Which of the following would managers most likely use to retrieve information about sales during the month of October?a. DML b. DSLC. DDEd. DQL
Why is good data important? What are the consequences of bad/corrupt data?
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several
Which of the following attributes would most likely be a primary key?a. Supplier nameb. Supplier numberc. Supplier Zip coded. Supplier account balance
Explain the advantages of database systems for accountants.
Which of the following is a software program that runs a database system?a. DQLb. DBMSc. DMLd. DDL
Describe what a tuple in a database is. What does it consist of, and what function does it have in a database?
The constraint that all primary keys must have nonnull data values is referred to as which of the following?a. Referential integrity ruleb. Entity integrity rulec. Normalization ruled. Relational
The constraint that all foreign keys must have either null values or the value of a primary key in another table is referred to as which of the following?a. Referential integrity ruleb. Entity
Which of the following is not a basic requirement of a relational database?a. Primary keys cannot be null.b. Every column in a row must be single valuedc. Foreign keys cannot be null.d. All
Which of the following is a fraud in which employees use the company’s computer time to run their own data processing business?a. Input fraudb. Processor fraudc. Computer instructions
Do you agree that high penalty, such as losing good salaries or retirement benefits, is the most effective way to reduce employee fraud because the cost of dishonesty is excessive?
Which type of fraud is associated with 50% of all auditor lawsuits?a. Kitingb. Fraudulent financial reportingc. Ponzi schemesd. Lapping
Which of the following statements is false?a. The psychological profiles of white-collar criminals differ from those of violent criminals.b. The psychological profiles of white-collar criminals are
Which of the following conditions is/are usually necessary for a fraud to occur? (Select all correct answers.)a. Pressureb. Opportunityc. Explanationd. Rationalization
Which of the following is not an example of computer fraud?a. Theft of money by altering computer recordsb. Obtaining information illegally using a computerc. Failure to perform preventive
For each of the following independent cases of employee fraud, recommend how to prevent similar problems in the future.a. Some customers found that the products of a prestigious brand sold at the
Which of the following causes the majority of computer security problems?a. Human errorsb. Software errorsc. Natural disastersd. Power outages
An insurance company in Asia reported profit of $100 million for the financial year through the news-dissemination system of the stock exchange. Its stock price increased several times, as the
Which of the following is not one of the responsibilities of auditors in detecting fraud according to SAS No. 99?a. Evaluating the results of their audit testsb. Incorporating a technology
Which of the following control procedures is most likely to deter lapping?a. Encryptionb. Continual update of the access controlc. Background check on employeesd. Periodic rotation of duties
Which of the following is the most important, basic, and effective control to deter fraud?a. Enforced vacationsb. Logical access controlc. Segregation of dutiesd. Virus protection controls
The ACFE periodically prepares an article called “What Is Your Fraud IQ?” It consists of 10 or more multiple choice questions dealing with various aspects of fraud. The answers, as well as an
Once fraud has occurred, which of the following will reduce fraud losses? (Select all correct answers. )a. Insuranceb. Regular backup of data and programsc. Contingency pland. Segregation of
Explore the Fraud Prevention, Detection, and Response portion of the AICPA website
A set of instructions to increase a programmer’s pay rate by 10% is hidden inside an authorized program. It changes and updates the payroll file. What is this computer fraud technique
Which computer fraud technique involves a set of instructions hidden inside a calendar utility that copies itself each time the utility is enabled until memory is filled and the system
Interest calculations are truncated at two decimal places, and the excess decimals are put into an account the perpetrator controls. What is this fraud called?a. Typosquattingb. URL
When a company stores your password for their business, they normally perform a mechanism called “hashing”. A hash is a one-way function which takes a word and gives it an apparently random
Showing 1900 - 2000
of 3273
First
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Last