lOMoARcPSD|12507101 Test Bank AIS - Accounting information system test bank Accounting (Princess Nora bint Abdulrahman University) StuDocu is not sponsored or endorsed by any college or university Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 1 (new version) MULTIPLE CHOICE 1. A set of two or more interrelated components that interact to achieve a goal is: a) A system b) An accounting information system c) Data d) Mandatory information 2. This results when a subsystem achieves its goals while contributing to the organization's overall goal. a) Goal conflict b) Goal congruence c) Value of information d) Systems congruence 3. Goal conflict may result when a) A decision or action of a subsystem is inconsistent with the system as a whole. b) A subsystem achieves its goals while contributing to the organization's overall goal. c) Duplicate recording, storage and processes are eliminated. d) The data exceeds the amount the human mind can absorb and process. 4. Facts that are collected, recorded, stored and processed by an information system a) Information b) Data c) Systems d) Mandatory information 5. Information is a) What happens when the data exceeds the amount the human mind can absorb. b) The benefit produced by the information minus the cost of producing it. c) Facts that are collected, recorded, stored, and processed by an information system. d) Data that have been organized and processed to provide meaning to a user. 6. Data are a) facts entered, stored, and processed by an information system. b) processed output that is useful to decision makers. c) another word for information. d) quantitative facts that are not qualitative by nature. 7. Which of the following statements below shows the contrast between data and information? a) Data is the output of an AIS. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) Information is the primary output of an AIS. c) Data is more useful in decision-making than information. d) Data and information are the same. 8. Information is a) basically the same as data. b) raw facts about transactions. c) potentially useful facts when processed in a timely manner. d) data that has been organized and processed so that it's meaningful. 9. Humans can absorb and process only so much information. Information __________ occurs when those limits are passed. a) overload b) excess c) anxiety d) discretion 10. The value of information can best be defined as a) how useful it is to decision makers. b) the benefits produced by possessing and using the information minus the cost of producing it. c) how relevant it is. d) the extent to which it maximizes the value chain. 11. The benefit produced by the information minus the cost of producing it. a) Goal congruence b) Information c) Information overload d) Value of information 12. An accounting information system (AIS) processes __________ to provide users with __________. a) data; information b) data; transactions c) information; data d) data; benefits 13. How many components are found in an AIS? a) three b) four c) five d) six 14. An accounting information system in part consists of Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) People, hardware and programs. Information, programs and computers. People, procedures, data, software and information technology infrastructure. Internal controls and accounting records. 15. Information that reduces uncertainty, improves decision makers' ability to make predictions, or confirms or corrects their prior expectations, is said to be a) Complete b) Relevant c) Reliable d) Timely 16. Information that is free from error or bias and accurately represents the events or activities of the organization is a) Relevant b) Reliable c) Verifiable d) Timely 17. Information that does not omit important aspects of the underlying events or activities that it measures is a) Complete b) Accessible c) Relevant d) Timely 18. When two knowledgeable people acting independently each produce the same information, this information is said to be a) Complete b) Relevant c) Reliable d) Verifiable 19. Data must be converted into information to be considered useful and meaningful for decision-making. There are six characteristics that make information both useful and meaningful. If information is free from error or bias and accurately represents the events or activities of the organization, it is representative of the characteristic of a) Relevancy b) Timeliness. c) Understandability d) Reliability 20. The primary consideration when producing this type of information is that its benefits exceeds its costs. a) Discretionary information b) Essential information Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) Mandatory information d) Value of information 21. An AIS is a system of six interrelated components that interact to achieve a goal. One of these components, which includes both manual and automated activities that involve collecting, processing, and storing data, is known as a) Information or data b) Procedures and instructions c) Software d) Information technology infrastructure 22. An accounting information system must be able to perform which of the following tasks? a) collect transaction data b) process transaction data c) provide adequate controls d) all of the above 23. Which of the following is not an example of a common activity in an AIS? a) buy and pay for goods and services b) sell goods and services and collect cash c) summarize and report results to interested parties d) recording of sales calls for marketing purposes 24. Which of the following is not one of the components of an AIS? a) Internal controls and security measures b) People c) Procedures and instructions d) Software and hardware 25. An AIS must be able to fulfill three important functions in any organization. One such function is the collecting and storing of data about activities performed by the organization. One group that relies on both the adequate collection and transformation of data for decision-making purposes for an organization is a) management. b) interested outsiders. c) competitors. d) the government. 26. The primary objective of accounting is to a) implement strong internal controls. b) provide useful information to decision makers. c) prepare financial statements. d) ensure the profitability of an organization. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 27. The Financial Accounting Standards Board (FASB), in its Statement of Financial Accounting Concepts No. 2, has defined accounting as a) an information identification, development, measurement, and communication process. b) a way to provide adequate controls to safeguard an organization's assets. c) being an information system. d) a way to collect and transform data into useful information. 28. Which activity below would not be considered to be a "top" accountant work activity? a) process improvement b) input into future product marketing initiatives c) long-term strategic planning d) computer systems and operations 29. The American Institute of Certified Public Accountants (AICPA) has recognized the importance of AIS and the major impact information technology has on the area of accounting. To recognize individual CPAs who have met educational and experiential requirements in this area, the group formally created the designation known as a) the Certified Management Accountant. b) the Certified Information Technology Professional. c) the Certified Internal Auditor. d) the Certified Data Processing Professional. 30. An analysis conducted by the Institute of Management Accountants shows that the most important activities performed by corporate accountants relate to a) customer and product profitability. b) internal consulting. c) process improvement. d) accounting systems and financial reporting. 31. The primary focus of an AIS course, as opposed to other IS courses, is on a) application of information technology. b) use of accounting software. c) understanding how information technology can be used to improve AIS processes. d) preparation of financial statements. 32. The AIS must include controls to ensure a) safety and availability of data. b) marketing initiatives match corporate goals. c) information produced from data is accurate. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) both A and C 33. A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the a) organizational culture. b) customer base. c) external financial statement users. d) production activity. 34. The process of creating value for customers is the result of nine activities (five primary and four support) that taken together form a a) value chain. b) profitable operation. c) successful business. d) support system. 35. The value chain concept is composed of two types of activities known as a) primary and support. b) primary and secondary. c) support and value. d) technology and support. 36. Which of the following is a primary activity in the value chain? a) infrastructure b) technology c) purchasing d) marketing and sales 37. In value chain analysis, what is the activity of arranging the delivery of products to customers called? a) outbound logistics b) inbound logistics c) shipping d) delivery 38. An AIS provides value by a) improving products or services through information that increases quality and reduces costs. b) providing timely and reliable information to decision makers. c) creating new products. d) both A and B Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 39. In Chapter 1, Figure 1-2 shows the factors that influence the design of AIS. The diagram shows a bi-directional arrow between the organizational culture and the AIS. The reason for this two-way interchange between organizational culture and AIS is a) that the AIS should not influence the values of the organizational culture. b) because the organization's culture influences the AIS, and likewise the AIS influences the organization's culture by controlling the flow of information within the organization. c) due to the transfer of managers between the two corporate elements. d) the AIS impacts the organization's key strategies. 40. The objective of the majority of organizations is to provide value to their customers. The activities that support such an objective can be conceptualized as forming a value chain. Within this value chain, logistics plays an important role. Logistics is both inbound and outbound in nature. An example of inbound logistics would consist of a) the activities that transform inputs into final products or services. b) the activities that help customers to buy the organization's products or services. c) the activities that provide post-sale support to customers. d) the activities that consist of receiving, storing, and distributing the materials used as inputs by the organization to create goods and/or services it sells. 41. A good example of how an AIS is used to share knowledge within an organization is a) the use of an expert system to help staff identify the relevant experts who can help with a particular client. b) the use of laptop computers to access a network for messaging worldwide. c) the monitoring of production equipment to watch for defects. d) the use of point-of-sale data to determine hot-selling items. 42. Within the value chain conceptual framework, organizations also perform a number of other support activities that enable the five primary value chain activities to be performed efficiently and effectively. One such support activity is research and development. This activity can be identified as a a) firm infrastructure activity. b) human resources activity. c) technology activity. d) purchasing activity. 43. Within the value chain conceptual framework, AIS is shown as a support activity. The AIS is of value to an organization when it provides accurate and timely information to help support the five primary value chain activities. When the AIS provides information in a timely and accurate manner, it stands as an example of a) improved decision making. b) improving the quality and reducing the costs of products or services. c) improving efficiency. d) All of the above Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 44. A decision situation that is non-routine and for which no established framework exists for making the decision is called a(n) __________ decision. a) structured b) semistructured c) unstructured d) strategic 45. A decision that is repetitive, routine and well understood is a) structured b) semistructured c) unstructured d) strategic 46. Which of the following is an example of a strategic planning decision? a) setting financial and accounting policies b) conducting a performance evaluation c) budgeting d) developing human resource practices 47. Decisions about the effective and efficient execution of specific tasks are concerned with a) operational control. b) management control. c) strategic planning. d) tactical planning. 48. Budgeting and human resource practices are examples of a) operational control b) management control c) strategic planning d) tactical planning 49. Accounting information plays major roles in managerial decision making by a) identifying situations requiring management action. b) reducing uncertainty. c) providing a basis for choosing among alternative actions. d) all of the above 50. Business activities that pertain to product pricing, discount and credit terms, and identifying the most and least profitable items are part of the __________ activity in the organization's value chain. a) service b) marketing and sales Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) operations d) inbound logistics 51. A principal focus of AIS is to assist with the decision-making function of an organization. The degree of support AIS can provide depends on the type of decision being made. Decisions are categorized in terms of the degree of existing structure or the effect of their scope. From the items below, select the description that is an example of a semi-structured decision. a) selecting basic research projects to undertake b) setting a marketing budget for a new product c) extending credit to an established customer d) hiring a senior manager 52. Regarding decision scope, which statement below is true? a) Operational control is concerned with the effective and efficient use of resources for accomplishing organizational objectives. b) Management control is concerned with the effective and efficient performance of specific tasks. c) Strategic planning is concerned with establishing organizational objectives and policies for accomplishing those objectives. d) There is no real correlation between a manager's level in an organization and his or her decision-making responsibilities. 53. A well-designed AIS can improve the decision-making function within the organization. Which statement below would describe a limitation, rather than a benefit, of an efficient AIS? a) An AIS reduces uncertainty, and therefore accounting information can provide a basis for choosing among alternative courses of action. b) An AIS identifies situations requiring management action. c) An AIS provides to its users an abundance of information without any filtering or condensing of such information. d) An AIS provides information about the results of previous decisions which provides decision makers with feedback that can be used in future decision making. 54. A strategic position is important to the success and growth of any organization. Harvard professor Michael Porter has identified three basic strategic positions. Which statement below is false regarding these basic strategic positions? a) The three basic strategic positions are mutually exclusive of each other. b) Part of a needs-based strategic position is to identify a target market. c) An access-based strategic position involves serving a subset of customers who differ from other customers in terms of geographic location or size. d) A variety-based strategic position involves producing or providing a subset of the industry's products or services. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. A strategic position is important to the success and growth of any organization. Harvard professor Michael Porter has identified two basic business strategies. Which statement below is false regarding these basic strategies? a) A product differentiation strategy entails adding features or services not provided by competitors to a product so customers can be charged a premium price. b) A low-cost strategy entails striving to be the most efficient producer of a product or service. c) Sometimes a company can succeed in both producing a better product and achieving low costs. d) The two basic strategic positions are mutually exclusive. 56. According to Michael Porter, to be successful in the long run, a company must a) deliver greater value to customers and/or create comparable value at a lower cost. b) maximize profits. c) maximize shareholder value. d) both B and C 57. A variety-based strategic position involves a) trying to serve most or all of the needs of a particular group of customers. b) serving a subset of customers who differ from other customers. c) providing a subset of the industry's products or services. d) serving all needs of all customers. 58. A needs-based strategic position involves a) trying to serve most or all of the needs of a particular group of customers. b) serving a subset of customers who differ from other customers. c) providing a subset of the industry's products or services. d) serving all needs of all customers. 59. An access-based strategic position involves a) trying to serve most or all of the needs of a particular group of customers. b) serving a subset of customers who differ from other customers. c) providing a subset of the industry's products or services. d) serving all needs of all customers. 60. The Internet has changed the way many processes are performed in business today. The Internet has had a material effect on the five primary characteristics in the value chain and on the strategy adopted by businesses that incorporate use of the Web into their business systems. Which statement below is true regarding the Internet relative to a strategic position that a business may adopt? a) Use of the Internet has reduced the power of buyers. b) The Internet has increased the barriers to entry in many industries. c) Use of the Internet reduces pressure to compete on price. d) The most important effect of the development of the Internet in business is the increased importance of adopting a viable business strategy. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 SHORT ANSWER 61. Define the concept of a system. 62. Define data, information, and how the value of information is determined. 63. Define an accounting information system. 64. Identify the components of an accounting information system. 65. What is the CITP designation and why is it important to AIS? 66. Differentiate between an AIS course and other accounting courses. 67. Harvard professor Michael Porter contends that for a company to be successful in the long run it "must deliver greater value to customers or create comparable value at a lower cost, or do both" and suggests three strategic positions. Describe these strategic positions. How do these strategic positions relate to financial and managerial accounting information given? 68. What is the purpose behind the five primary activities in the value chain? 69. Name the primary activities of a firm's value chain. 70. How can an AIS add value to the organization? 71. How can a well-designed AIS improve the efficiency and effectiveness of a company's value chain? ESSAY 72. Discuss the concept of a system and the issues of goal conflict and goal congruence. 73. Discuss the seven characteristics of useful information. 74. Explain what an AIS is, describe the basic tasks it performs in an organization, and give some examples of the types of accounting transactions it processes. 75. Discuss the steps in the supply chain. 76. How can an AIS become part of the firm's value chain and add value to the business? 77. How can the value of the information produced by an accounting information system be determined? What would a measurement and verification expert think about quantification and verification of such information? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. A 2. B 3. A 4. B 5. D 6. A 7. B 8. D 9. A 10. B 11. D 12. A 13. D 14. C 15. B 16. B 17. A 18. D 19. D 20. A 21. B 22. D 23. D 24. D 25. A 26. B 27. C 28. B 29. B 30. D 31. C Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 32. D 33. A 34. A 35. A 36. D 37. A 38. D 39. B 40. D 41. A 42. C 43. D 44. C 45. A 46. A 47. A 48. B 49. D 50. B 51. B 52. C 53. C 54. A 55. D 56. A 57. C 58. A 59. B 60. D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 61. A system is a set of two or more components that are somehow interrelated and interact together to achieve a specific goal. 62. Data: facts that are collected, entered, recorded, stored, and processed by an AIS. Information: data that has been organized and processed and is meaningful to its users. Such information is relevant, timely, reliable, verifiable, complete, and understandable. Information is of value when the benefits received from using or acting upon it outweighs the cost to produce the information. 63. An AIS is a system that collects, records, stores, and processes data to produce information for decision makers. An AIS is a valuable tool when integrated with the strategic planning initiatives of an organization. 64. A well-designed AIS consists of people, procedures and instructions, data, software, information technology infrastructure, and internal controls and security measures. 65. The CITP designation stands for "Certified Information Technology Professional." It is awarded to CPAs who have demonstrated a broad range of knowledge and skill sets in the areas of accounting and information systems and technology. The AICPA (American Institute of CPAs) has acknowledged the importance and close relationship that accounting and information systems share in creating this specialty designation for accounting information system professionals. 66. Other accounting courses assume the preparation or reporting of accounting information is for external or internal users. However, the AIS course focuses on the flow of accounting information in the organization from a systems perspective. The AIS course traces the origin, processing, storing, and ultimate disposal of information. An AIS course also focuses on business processes, organization structure, information systems, and corporate planning and goals. 67. The three strategic positions described are: a) a variety-based strategic position that involves producing or providing a subset of the industry's products or services; b) a needs-based strategic position that involves trying to serve most or all of the needs of a particular group of customers; and c) an access-based strategic position that involves serving a subset of customers who differ from other customers in terms of factors such as geographic location or size which create different requirements for serving those customers. AIS that has been properly designed can support an organization in attaining and maintaining a strategic position. Such an information system can be a valuable asset in helping the organization to maintain a competitive position in the marketplace. 68. The goal of the five primary activities in the value chain is to facilitate the business in providing value to its customers. The five primary activities allow the business to create, market, and deliver its products and services to its customers, as well as providing postsale support. 69. Inbound logistics, operations, outbound logistics, marketing and sales, and service. 70. An AIS can increase the efficiency and effectiveness of the value chain by improving the quality and lowering costs of products or services, improving efficiency of operations, improving decision making, enhancing the sharing of knowledge, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 improving the efficiency and effectiveness of its supply chain and improving the internal control structure. 71. The AIS can be designed to allow customers direct access to a company's inventory and sales order entry systems. This allows the customer to do more of the work that traditionally has been done by sales, marketing, and administration personnel. This all f fa e de ing, and c he c m an lab c . I ma also have the effect of allowing the customer more control in a purchase transaction that may bring more satisfaction and value to the customer. 72. A system is a set of two or more components that are somehow interrelated and interact together to achieve a specific goal. A system usually consists of smaller components called subsystems. These subsystems have specific and defined functions, which interact with and support the larger system. The concept of systems is key to information technology and AIS. All systems, including the AIS, must work to achieve one or more organizational goals. Goal conflict results when a decision or action of a subsystem is inconsistent with another subsystem or the system (organization) as a whole. Goal congruence results when a subsystem achieves its goals while contributing to the organization's overall goal. Subsystems should maximize organizational goals. 73. The seven characteristics of useful information are: relevant, reliable, complete, timely, understandable, verifiable and accessible. These characteristics are qualities that information should possess to be useful in a business environment. Briefly stated, in order for information to be useful it must be: 1) relevant, meaning that it reduces uncertainty and adds to the decision-making process; 2) reliable information is information that is free from error, and is accurate in its nature; 3) complete information is information that does not omit any important data, facts, or aspects about events or activities; 4) information is timely when it is fully available to enable the decision-making process to proceed; 5) understandable information must be both in an intelligible and useful format; 6) information is considered verifiable if two people, acting independently of each other, produce the same information or the same results. Information is accessible if it is available to users when they need it and in a format they can use. 74. An AIS consists of six components: people, procedures, instructions, data, software, and information technology infrastructure and internal controls and security measures. The AIS performs three major functions: 1) it collects and stores data about activities and transactions so that the organization's management, employees, and interested outsiders can review what has happened; 2) the AIS processes data (that is, facts that have been collected and stored) into information that is useful for making decisions, and is of value to the organization; and 3) the AIS provides adequate controls designed to safeguard the organization's assets, including its data and information. Common examples of accounting transactions that an AIS helps to process and track are the sales of products to customers, cash collections, cash payments, and the recording and payment of the employees' payroll. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 75. The supply chain shows how an organization interacts with suppliers, distributors, and customers to provide value in the products it sells. The supply chain depicts the creation and sale of a product-the chain is somewhat different when a service is involved. The supply chain has five components: raw materials; manufacturer; distributor; retailer; and the consumer. Raw materials come from any number of suppliers, which in turn become part of a manufacturing process, which produces a product. The business then provides the product to distributors, who in turn sell the product to retail businesses. The product is ultimately purchased and used by consumers (who may be individuals or businesses). It is important to realize that AIS can greatly impact the traditional supply chain by creating a more efficient and timely environment in which a business can operate. More efficient operations are more effective, which in turn lowers costs, and add greater value and create improved customer satisfaction. 76. The AIS can add value by: helping to improve products and services an organization offers for sale; increasing the quality of products and services; creating greater efficiency by reducing costs and saving time; and improving the overall efficiency of the organization. Decision making is enhanced by the better availability of timely, complete, reliable, verifiable, and relevant information. A firm can enjoy a competitive advantage with better customer ordering, billing, and customer service made possible by an improved AIS. The AIS can also enhance overall communication and use of knowledge in a business by making the knowledge readily available to interested parties. 77. A well-designed AIS improves the efficiency and effectiveness of the value chain by improving the quality and lowering the overall cost of products or services, improving efficiency of operations, improving decision making, and enhancing the sharing of knowledge. These are the benefits of possessing and using information. Drawbacks to possessing and using such information are the costs of obtaining and maintaining such information. These costs include investments in people, processes, and computing and networking hardware and software on an ongoing basis. Costs of the information are quantifiable to some extent. However, some of the benefits of using the information involve numerous estimates and assumptions. As such, the quantification of the benefits of utilizing such information depends on the accuracy of the assumptions. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 2 (new version) MULTIPLE CHOICE 1. An agreement between two entities to exchange goods or services or any other event that can be measured in economic terms by an organization is a) give-get exchange b) transaction c) revenue d) processing cycle 2. Groups of related business activities such as the acquisition of merchandise and payment of vendors are called a) transaction cycles. b) economic cycles. c) business events. d) transactions. 3. The transaction cycles approach leads to efficient processing of large number of transactions because a) transaction cycles are easier to computerize. b) a large number of transactions within a given cycle can be categorized into a relatively small number of distinct types. c) the transaction cycle approach represents the natural order of business. d) transaction cycles are easy to understand. 4. The basic "give and take" functions of a business have been grouped into transaction cycles. The cycle that includes the events of hiring employees and paying them is known as the a) revenue cycle. b) expenditure cycle. c) human resources cycle. d) financing cycle. 5. What is the major difference between the revenue and the expenditure cycle? a) The revenue cycle includes marketing activities; the expenditure cycle does not. b) In the revenue cycle, cash is received; in the expenditure cycle cash is paid out. c) The expenditure cycle includes paying employees. d) The revenue cycle includes the activity of obtaining funds from investors. 6. The business owners obtain financing from outside investors, which results in an inflow of cash into the company. This transaction is considered to be part of which cycle? a) the revenue cycle b) the payroll cycle c) the production cycle d) the financing cycle Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7. Which of the following is not a transaction cycle? a) revenue b) expenditure c) human resources d) general ledger and reporting 8. All transaction cycles feed information directly into the a) financial statements. b) governmental reports. c) general ledger and reporting system. d) financing operations. 9. Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the expenditure cycle would be a) give cash, get cash. b) give cash, get goods. c) give cash, get labor. d) give goods, get cash. 10. Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the revenue cycle would be a) give cash, get goods. b) give goods, get cash. c) give cash, get labor. d) give cash, get cash. 11. The transaction cycles relate to one another and interface with this to generate information for both management and external parties. a) general ledger and reporting system b) accounting information systems c) computer processor d) human resources cycle 12. Many modern accounting software packages offer separate transaction cycle modules. What is the reason for this? a) Every organization does not need to implement all of the available transaction cycle modules. b) Most businesses do not need the revenue cycle module as part of their AIS. c) The nature of a given transaction cycle is the same irrespective of the type of organization. d) A properly designed AIS does not use the concept of separate business transaction cycles to process transactions. 13. Which of the following statements is false? a) Retail stores do not have a production cycle. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) Financial institutions have installment-loan cycles. c) A service company does not have an inventory system. d) Every organization should implement every transaction cycle module. 14. The operations performed on data to generate meaningful and relevant information are referred to as a) general ledger and reporting system b) accounting information system c) financial reporting d) data processing cycle 15. One of the steps in the data processing cycle is data input. What is the catalyst for data input into a system? a) The production transaction system automatically checks each hour to see if any new data is available for input and processing. b) The performance of some business activity generally serves as the trigger for data input. c) A general ledger program is queried to produce a trial balance at the end of an accounting period. d) Data is only input when an authorized party permits the input to occur. 16. A typical source document could be a) in some paper form. b) a computer data entry screen. c) a notepad entry. d) both A and B 17. Which step below is not considered to be part of the data processing cycle? a) data input b) feedback from external sources c) data storage d) data processing 18. Data must be collected about three facets of each business activity. What are they? a) the business activity, the resources it affects, the people who participate b) the business activity, the transactions it creates, the impact on the financial statements c) the inputs, outputs and processes used d) who is involved, what was sold, how much was paid 19. Certain documents or forms are generated and/or processed with each transaction cycle. The issuing of a purchase order is part of which transaction cycle? a) the revenue cycle b) the production cycle c) the human resources cycle d) the expenditure cycle Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 20. Certain documents or forms are generated and/or processed with each transaction cycle. The collection of job time tickets or time sheets is part of which transaction cycle? a) the revenue cycle b) the production cycle c) the human resources cycle d) the expenditure cycle 21. Common source documents for the revenue cycle include all of the following except a) sales order. b) receiving report. c) delivery ticket. d) credit memo. 22. Which of the following documents would be found in the expenditure cycle? a) delivery ticket b) time card c) journal voucher d) purchase order 23. Businesses usually use some type of documents in the data input step of the data processing cycle. Documents that are sent to customers or suppliers and then sent back to the organization in the course of a business transaction are known as a) turnaround documents. b) source documents. c) source data automation. d) rubber or bounce-back documents. 24. What is a primary example of source data automation? a) a utility bill b) POS (point-of-sale) scanners in retail stores c) a bill of lading d) a subsidiary ledger 25. Pre-numbering of source documents helps to verify that a) all transactions have been recorded since the numerical sequence serves as a control. b) no inventory has been misplaced. c) documents have been used in order. d) all cash has been collected. 26. Source documents generally help to improve accuracy in transaction processing because a) they specify which information to collect due to their structure. b) standard information is preprinted on the document. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) they provide directions and steps for completing the form. d) All of the above are correct. 27. When the sum of all entries in the subsidiary ledger equals the amount in the corresponding general ledger account, it is assumed that (select all that apply) a) the recording and posting processes are accurate. b) all of the transaction cycles have been completed. c) since the ledgers are in balance, adjusting entries are not required. d) no errors exist in the subsidiary ledger and corresponding general ledger account. 28. The general ledger account that corresponds to a subsidiary ledger account is known as a a) dependent account. b) attribute account. c) entity account. d) control account. 29. The systematic assignment of numbers or letters to items to classify and organize them is known as a) coding b) chart of accounts c) data input d) pre-numbered documents 30. Pre-numbered checks, invoices and purchase orders are examples of a) sequence codes b) block codes c) group codes d) hierarchical codes 31. A chart of accounts is an example of (select all that apply) a) sequence codes b) block codes c) group codes d) hierarchical codes 32. Inventory items are often codes with these a) sequence codes b) block codes c) group codes d) hierarchical codes 33. A listing of general ledger accounts by account number is called the a) chart of accounts. b) listing of accounts. c) trial balance. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) subsidiary accounts. 34. Regarding codes, which of the following is false? a) The code should be consistent with its intended use. b) Codes should allow for growth in the number of items to be coded. c) Coding systems should be as simple as possible. d) Coding systems need not be consistent across divisions of an organization. 35. To be effective, the chart of accounts must a) be as concise as possible. b) contain only five account categories. c) limit account codes to 10 digits or less. d) contain sufficient detail to meet the information needs of the specific organization's AIS. 36. The chart of accounts for a manufacturing corporation would include a) retained earnings. b) common stock. c) raw materials inventory. d) all of the above 37. The chart of accounts of a corporate retail bookstore would probably include a) work-in-process inventory. b) a drawing account. c) retained earnings. d) both A and C 38. In a chart of accounts using three digits for each account, each numeric digit has meaning to users of the AIS. For example, a numeric digit may represent either a major category of accounts, a primary financial subaccount within each category, or a specific account into which transaction data will be posted. Using this example, which digit position would best represent a primary financial subaccount within an account category? a) first b) second c) third d) fourth 39. In transaction processing, generally which activity comes first? a) recording data in a journal b) posting items to special journals c) capturing data on source documents d) posting data to a ledger Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 40. The efficiency of recording numerous business transactions can be best improved by the use of a) prenumbered source documents. b) specialized journals. c) posting references. d) segregation of duties. 41. A general journal a) is used to record infrequent or non-routine transactions. b) simplifies the process of recording large numbers of repetitive transactions. c) records all detailed data for any general ledger account that has individual subaccounts. d) contains summary-level data for every account of the organization. 42. The general ledger a) is used to record infrequent or non-routine transactions. b) simplifies the process of recoding large numbers of repetitive transactions. c) records all detailed data for any general ledger account that has individual subaccounts. d) contains summary-level data for every account of the organization. 43. A subsidiary ledger a) is used to record infrequent or non-routine transactions. b) simplifies the process of recoding large numbers of repetitive transactions. c) records all detailed data for any general ledger account that has individual subaccounts. d) contains summary-level data for every account of the organization. 44. A specialized journal a) is used to record infrequent or non-routine transactions. b) simplifies the process of recording large numbers of repetitive transactions. c) records all detailed data for any general ledger account that has individual subaccounts. d) contains summary-level data for every account of the organization. 45. An audit trail a) provides the means to check the accuracy and validity of ledger postings. b) is provided by the ledger and the general journal. c) is automatically created in every computer-based information system. d) is a characteristic of interest. 46. Something about which information is stored is a) attribute b) database c) entity d) record Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 47. Characteristics of interest that need to be stored are a) attribute b) database c) entity d) record 48. Computers store data by organizing smaller units of data into larger units, which have meaning to users. Data values that are stored in a physical space are called a a) field. b) record. c) file. d) database. 49. Related records grouped together form a(n) a) field. b) entity. c) file. d) database. 50. The set of fields that contain data about various attributes of the same entity forms a a) entity b) record. c) file. d) database. 51. Concerning a master file, which of the following statements is false? a) It is conceptually similar to a ledger in a manual AIS. b) It stores cumulative information about an organization's resources. c) It exists across fiscal periods. d) Its individual records are not changed. 52. Basic data storage concepts define both entities and attributes. An entity is something about which information is stored. Which item below would not be considered an entity? a) a customer address b) a customer c) an employee d) an inventory item 53. Which of the following is conceptually similar to a journal in a manual AIS? a) database b) master file c) record d) transaction file Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 54. Which of the following is not one of the four types of file processing? a) changing b) updating c) deleting d) altering 55. Periodic updating of the data stored about resources and agents is a) On-line processing b) real-time processing c) batch processing d) data processing 56. Concerning processing, which of the following statements is true? a) Batch processing ensures that stored information is always current. b) Batch input is more accurate than on-line data entry. c) On-line batch processing is a combination of real-time and batch processing. d) Batch processing is almost never used. 57. Federal Express stated in one of its mission statements that "positive control of each package will be maintained by utilizing . . . electronic tracking and tracing systems." This is an example of which type of data processing? a) real-time processing which features immediate updating as to the location of packages b) batch processing which features updating at fixed time periods c) real-time processing which features updating at fixed time periods such as at the end of an accounting period d) batch processing which features immediate updating as to the location of packages 58. Documents generated at the end of transaction processing activities are called a) financial statements b) operational documents c) reports d) source documents 59. Which of the following is not a type of report provided to decision makers by the typical AIS? a) financial statements b) customer satisfaction surveys conducted by third parties c) managerial reports d) All of the above reports are important to decision makers. 60. Which statement below regarding the AIS and managerial reports is false a) The AIS must be able to provide managers with detailed and operational information about the organization's performance. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) Both traditional financial measures and operational data are required for proper and complete evaluation of performance. c) Most source documents capture both financial and operational data about business transactions. d) Traditionally, most AIS systems have been designed so that both financial and operational data are stored in a manner that facilitates their integration in reports. 61. A formal expression of goals and objectives in financial terms is called a(n) a) mission statement. b) strategic plan. c) budget. d) operational plan. 62. A projection of an organization's cash inflows and outflows is known as a(n) a) performance budget. b) operating budget. c) management budget. d) cash budget. 63. Identify an example of external source data that is important to an organization. a) customer satisfaction as gauged by surveys b) staff salaries as a percentage of sales c) satisfaction of employees with their work environment d) sales revenue divided by the number of hours worked by the sales staff 64. Some information will have to be collected from __________ sources to determine, for example, customer satisfaction. a) external b) internal c) regulatory d) competitive 65. Performance reports are primarily used for a) financial control. b) cash planning. c) forecasting. d) financial planning. 66. A report which shows actual results, budgets, and variances is called a a) financial plan. b) cash budget. c) performance report. d) managerial report. 67. Variances to the budget should be interpreted by using the principle of a) management by exception. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) management by objectives. c) management by exemption. d) exceptions to variances. 68. One of the most important assumptions about how managers will act in a budgetcontrolled environment is that: a) managers will largely ignore budgets. b) budgets must be too tight to encourage high aspirations. c) budget slack will exist in almost every budget and is negotiated by all managers. d) measurement affects behavior. 69. Which managerial tool below is used to provide the organization with financial control? a) a cash budget b) a performance report c) a sales budget d) a customer satisfaction survey SHORT ANSWER 70. How are "Give and Take" transactions classified in business today and what impact does this have on AIS? 71. Name the major transaction cycles. 72. What is the purpose of source documents? What controls are embedded in source documents? Give two examples of source documents. 73. Why have accounting software packages been designed with separate transaction modules? 74. Describe the purpose of subsidiary and control accounts. 75. What is an audit trail? 76. A well-designed data processing cycle should collect data connected with three facets of business activity. Name the three facets. 77. Source documents are usually generated in the process of conducting common business activities. Name a source document connected with the revenue cycle. 78. Source documents are usually generated in the process of conducting common business activities. Name a source document connected with the human resources cycle. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 79. What operational information should an AIS be capable of providing to management? 80. An AIS stores data by organizing smaller units of data into larger, more meaningful units. Briefly explain how data is stored in AIS. ESSAY 81. Describe the basic business activities and transactions for a typical merchandising company. 82. Coding systems are used throughout accounting information systems. Describe some useful guidelines that will result in a better coding system. 83. In accounting and AIS, what is the relationship between the general and subsidiary ledgers? 84. A company you have been asked to examine as part of an AIS consulting engagement employs a cashier who handles all cash receipts from customers. The cashier counts the cash daily, prepares the bank deposit, and carries the deposit to the bank every day after work. In addition, the cashier authorizes all discounts and allowances and decides when uncollectible accounts will be written off. Finally, because the accounting department is overworked at times, the cashier is allowed to post cash payments to customer accounts and reconcile the bank account. Outline how a dishonest cashier could misuse all these responsibilities to steal cash from the company. 85. It has been said "measurement affects behavior." What does this mean as it applies to business? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. b 2. a 3. b 4. c 5. b 6. d 7. d 8. c 9. b 10. b 11. a 12. a 13. d 14. d 15. b 16. d 17. b 18. a 19. d 20. c 21. b 22. d 23. a 24. b 25. a 26. d 27. a and d 28. d 29. a 30. a 31. b and c 32. c 33. a 34. d 35. d 36. d 37. c 38. b 39. c 40. b 41. a 42. d 43. c 44. b 45. a 46. c 47. a 48. a 49. c 50. b 51. d 52. a 53. d 54. d Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. c c a b b d c d a a a c a d b SHORT ANSWER 70. The concept of "Give and Take" transactions has been used to classify business transactions into "cycles" that have starting points, processes, and end points (or closure). The majority of business transactions can be classified as revenue, expenditure, human resources (payroll), production, and financing cycles. AIS has been modeled after these transaction cycles to achieve its basic functions of collecting and processing data, providing information useful for decision making, and establishing adequate controls. 71. The major transaction cycles are revenue, expenditure, human resources (or payroll), production, and financing. 72. The primary purpose of source documents is to record data about business activities. Source documents standardize data collection procedures for an organization and provide better control and accuracy. Source documents are generally pre-numbered, which helps to verify that all transactions have been recorded and there is no missing document; if a document is missing, then which one(s) can be determined. Proper design of source documents ensures which information to collect, preprints standard information such as addresses, and provides directions for completing the form. Examples include: invoices, timecards, sales orders, and purchase orders. 73. Since every organization does not necessarily use all of the transaction cycles in its operations, it is to the advantage of the organization to be able to "pick and choose" from among various software modules that track and record different transaction cycles. For example, a law firm would have no need to implement a production cycle module. Also, the nature of a transaction cycle varies across the broad spectrum of business organizations. Again, a law firm would have a revenue cycle, but it would not involve the purchase, receipt, and payment for products or merchandise; likewise a retail store chain may not sell any consulting services to its customers. 74. A subsidiary ledger is used when many sub-accounts (such as customers or vendors) must be tracked in detail. These types of accounts are used frequently for accounts receivable and accounts payable applications. The control account gives the overall or total picture for the subsidiary accounts. The control account will show total balances only and must balance to the sum of the individual detail amounts in the subsidiary accounts. 75. An audit trail provides a means to check the accuracy and validity of postings to the ledger. The posting references and document numbers help provide the audit trail. An audit trail exists when company transactions can be traced through the AIS from where originate to where they end up on the financial statements 76. The three facets of business activity are: 1) the event of interest; 2) the resource(s) affected by the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 event; and 3) the agents who participate in the event. 77. Revenue cycle source documents include sales orders, delivery tickets or bills of lading, remittance advice or remittance list, deposit slip, and credit memo. 78. Human resources (or payroll) cycle documents include employee's W-4 form, time cards, or job time tickets or time sheets. 79. Some examples are - reports about inventory status, relative profitability of products, percentage of revenue generated by new products, relative performance of each salesperson, cash collections and pending obligations, and an organization's performance in meeting its delivery and service commitments. The AIS should also be able to provide non-financial information connected with various transactions such as addresses, purchasing histories, telephone and fax numbers, e-mail addresses, Web sites, etc. 80. The smallest unit of data is known as a data value. A data value is physically stored in a space called a field. Any number of fields can be grouped together to form a record. Related records are grouped together to form a file. Files are then combined to form a database. ESSAY 81. Revenue - sell goods and services to customers and collect cash. Expenditure - obtain goods and services from vendors and pay cash. Human resources - hire qualified employees, train them, pay them, evaluate them, withhold and pay taxes, file tax forms, and comply with government regulations on employment. Financing - investments in company, procuring and repayment of loans, and payment of dividends and interest. 82. The following guidelines will result in a better coding system. First, the code should be consistent with its intended use. Second, the code should allow for growth in the number of items to be coded. The coding system should be as simple as possible. The coding system should be consistent with the company's organizational structure and it should be consistent across the different divisions of an organization. 83. The general ledger contains summary-level information about every asset, liability, equity, revenue, and expense account in an organization. The balances in general ledger accounts form the starting point for preparation of financial statements and various other financial reports. A subsidiary ledger account provides support for any general ledger account that has need of maintaining individual subaccounts (for example, accounts receivable, accounts payable, inventory, and fixed assets). The subsidiary ledger records and maintains the detail-level information for a general ledger account by having a separate record for each customer, vendor, inventory item, or fixed asset. The individual subaccount balances in a subsidiary ledger should equal the balance found in the general ledger account. A general ledger account that corresponds to a subsidiary ledger account is known as a control account. 84. This procedure represents a gross violation of the "segregation of duties" principle. The cashier could steal cash in any number of ways. For example, the cashier could misapply payments from other customers to cover the theft (this is better known as lapping). The cashier could steal cash by writing off the balances as bad debts or cover over the balances with illegitimate discounts. Also, the cashier could steal cash and then cover it up with entries to expense accounts or by preparing a "bogus" bank reconciliation. This is why it is critically important that there is a clear, unequivocal separation of duties when dealing with any aspect of cash in a business. 85. Generally speaking, when employees become aware of the tasks that are under evaluation and measurement, the employees will focus their efforts primarily on those tasks. This could be good or bad depending on the task being measured and the goals of the business. A business should not be merely focused on obtaining expectations from measuring certain tasks to the detriment of the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 operation of the business as a whole. Consider for example the measurement of the number of units of a product produced each hour. If the business is only concerned with maximizing output, employees may indeed produce more, but the quality of each unit produced may be unacceptable. If the units are shipped without knowledge of the lower quality, a higher failure rate per unit may occur. This will impact the users of the units, and so a customer service problem may arise due to the "push for higher output." It is important for the organization to balance measurement goals and objectives with the overall mission and values of the organization and its strategic objectives. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 CH 3 MULTIPLE CHOICE 1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called a) b) c) d) documentation. data flows. flowcharts. schema. 2. One popular means of documenting a system is to develop diagrams, flowcharts, tables, and other graphical representations of information. These are often supplemented by a) b) c) d) product specifications. narrative descriptions. logic charts. oral descriptions from management. 3. The graphic description of the flow of data within an organization is called a a) b) c) d) systems flowchart. data flow diagram. context diagram. document flowchart. 4. A graphical representation of the flow of documents and information between departments or areas of responsibility within an organization is called a) b) c) d) a data flow diagram. a document flowchart. a system flowchart. a program flowchart. 5. A graphical representation of the relationship among the input, processing and output in an information system is called a) b) c) d) a data flow diagram. a document flowchart. a system flowchart. a program flowchart. 6. A graphical description of the sequence of logical operations that a computer performs is called a) b) c) d) a data flow diagram. a document flowchart. a system flowchart. a program flowchart. 7. SAS No. 94 requires that independent auditors be able to a) b) c) d) draw computerized flowcharts. prepare flowcharts and decision tables before conducting an audit. understand a client's system of internal controls before conducting an audit. prepare and understand any type of system documentation. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 8. The passage of the Sarbanes Oxley Act a) Made documentation skills even more important. b) Requires public companies to prepare an annual internal control report. c) Means that auditors must be able to prepare, evaluate and read documentation tools such as flowcharts. d) All of the above. 9. Which of the following is not a true statement? a) Documentation tools save an organization both time and money. b) Documentation tools are used extensively in the systems development process. c) Data flow diagrams and flowcharts are the two most frequently used systems development documentation tools. d) Data flow diagrams and flowcharts are difficult to prepare and revise using software packages. 10. A data flow diagram a) is a graphical description of the source and destination of data that shows how data flow within an organization. b) is a graphical description of the flow of documents and information between departments or areas of responsibility. c) is a graphical description of the relationship among the input, processing, and output in an information system. d) is a graphical description of the sequence of logical operations that a computer performs as it executes a program. 11. In a DFD, a square box represents a) b) c) d) data sources and destinations. data flows. transformation processes. data stores. 12. In a DFD, a "data sink" is also known as a) b) c) d) data stores. transformation processes. data flows. data destinations. 13. In a DFD, an arrow represents a) b) c) d) data sources and destinations. the direction of data flows. transformation processes. data stores. 14. In a DFD, a circle represents a) b) c) d) data sources and destinations. the direction of data flows. transformation processes. data stores. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 15. In preparing a DFD, when data are transformed through a process, the symbol used should be a) b) c) d) a circle. an arrow. a square. two horizontal lines. 16. In a DFD, lines that are horizontal and parallel to each other represent a) b) c) d) data sources and destinations. data flows. transformation processes. data stores. 17. In a DFD, a "bubble" is also known as a) b) c) d) data stores. transformation processes. data flows. data destinations. 18. An entity that sends or receives data used or produced by the system is called a a) b) c) d) data source or destination. data store. data flow. data transformation. 19. A data flow diagram (or DFD) has four basic elements. The flow of data between processes, data stores, and data sources and destinations is known as a) b) c) d) data sources and destinations. data flows. transformation processes. data stores. 20. A data flow diagram (or DFD) has four basic elements. The altering of data from inputs to outputs is known as a) b) c) d) data sources and destinations. data flows. transformation processes. data stores. 21. A data flow diagram (or DFD) has four basic elements. The people and organizations that send data to and receive data from the system are known as a) b) c) d) data sources and destinations. data flows. transformation processes. data stores. 22. In general, a data destination will be shown by a) an arrow pointing away. b) an arrow pointing in. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) arrows pointing both ways. d) no arrows, only two horizontal lines. 23. In the data flow diagram of the customer payment process, "update receivables" will appear in a) b) c) d) a square. a circle. two horizontal lines. none of the above 24. In the data flow diagram of the customer payment process, "Customer" will appear in a) b) c) d) a square. a circle. two horizontal lines. none of the above 25. In the data flow diagram of the customer payment process, "Customer payment" will appear above or in a) b) c) d) a square. a circle. two horizontal lines. an arrow. 26. Most processes on a DFD can be identified by a) b) c) d) data in-flows only. data out-flows only. data flows both into or out of a process. always being followed by a data store. 27. Data flows between two symbols on a DFD have more than one data item. More than one arrow is needed if a) b) c) d) data elements always flow together. data elements flow at different times. data elements flow to different locations. there is no guideline on use of single or multiple arrows. 28. The transformation of data in a DFD is represented as a a) b) c) d) process. data dictionary. data stores. data source and destination. 29. The storage of data on a DFD is shown by a) b) c) d) circles. arrows. squares. two horizontal lines. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 30. Creating a DFD is an iterative process. Each DFD iteration helps the designer to refine the diagram and identify the fine points. A DFD created at a high-level or summary view is referred to as a a) b) c) d) data process diagram. data dictionary diagram. content diagram. context diagram. 31. In creating DFDs, a context diagram a) b) c) d) Includes major transformation processes. Depicts systems boundaries. Is not necessary. Is very detailed. 32. In a payroll processing DFD, the "prepare reports" activity will be represented by __________, the "employee payroll file" will be represented by __________, and the "bank" will be represented by __________. a) b) c) d) a circle; two horizontal lines; a square a circle; two horizontal lines; two horizontal lines a rectangle; a square; a circle a square; two horizontal lines; a circle 33. How should control processes and control actions be represented in a data flow diagram? a) b) c) d) using a square to represent a data source and destination using a circle to represent a transformation process using two horizontal lines to represent a data store control processes and actions should be ignored in a DFD 34. The term used to refine a high-level or summary view data flow diagram into successively lower levels to provide greater amounts of detail is a) b) c) d) expand. explode. implode. enlarge. 35. An analytical technique that uses standard symbols to graphically represent an information system in a clear, concise, and logical manner is called a a) b) c) d) data flow diagram. flowchart. schema. narrative. 36. Flowcharts are created using a standard set of symbols. These symbols can be divided into four basic categories. A square denotes an auxiliary operation and is found in which flowchart symbol category? a) input/output b) processing c) storage Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) flow and maintenance 37. What should be the first thing the creator of a flowchart does before beginning a flowchart? a) b) c) d) understand the system to be flowcharted identify the entries to be flowcharted design the flowchart so that it proceeds from left to right and top to bottom use standard flowcharting symbols 38. When designing either a DFD or a flowchart, a good rule to follow is a) b) c) d) to proceed from left to right. to proceed from top to bottom. to proceed from left to right and top to bottom. to identify exception procedures by using a rectangle. 39. Which is a true statement regarding the use of the manual processing symbol in a flowchart? a) b) c) d) If a document is moved from one column to another, show the document only in the last column. Each manual processing symbol should have an input and an output. Do not connect two documents when moving from one column to another. Each manual processing symbol should have an off-page connector. 40. Which is a true statement regarding the document flowchart? a) b) c) d) It illustrates the sequence of logical operations performed by a computer. It is particularly useful in analyzing the adequacy of internal control procedures. It should ignore control processes and actions. It is not normally used in the systems design process. Use the chart below to answer the following questions regarding flow chart symbols. 41. Which symbol would be used in a flowchart to represent a computer process? a) #1 b) #2 c) #5 Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) #15 42. Which symbol would be used in a flowchart to represent a decision? a) b) c) d) #10 #16 #9 #6 43. Which symbol would be used in a flowchart to represent an invoice sent to a customer? a) b) c) d) #2 #6 #1 #15 44. Which symbol would be used in a flowchart to represent a general ledger? a) b) c) d) #2 #1 #3 #5 45. Which symbol would be used in a flowchart to represent a manual process? a) b) c) d) #5 #6 #10 #11 46. Which symbol would be used in a flowchart to represent a connection to another part of the flowchart on the same page? a) b) c) d) #4 #13 #14 #15 47. Which symbol would be used in a flowchart to represent a connection to another part of the flowchart on a different page? a) b) c) d) #4 #13 #14 #15 48. Which symbol would be used in a flowchart to represent a file of paper documents? a) b) c) d) #7 #8 #9 #15 49. Which symbol would be used in a flowchart to represent a general ledger master file kept on magnetic disk? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) #2 #5 #7 #8 50. Which symbol would be used in a flowchart to represent employee time cards sent by department managers to the payroll department? a) b) c) d) #1 #4 #11 #16 51. Which symbol would be used in a flowchart to represent the display of a report on a computer screen? a) b) c) d) #1 #2 #3 #11 52. Which symbol would be used in a flowchart to represent the addition of information about a step represented in another symbol on the flowchart? a) b) c) d) #1 #5 #11 #15 53. Which symbol would be used in a flowchart to represent a payroll master file kept on magnetic tape? a) b) c) d) #4 #7 #8 #9 54. Which symbol would be used in a flowchart to represent a beginning, an ending, or a connection to another procedure? a) b) c) d) #9 #14 #15 #16 55. Which symbol would be used in a flowchart to represent a flow of data or documents? a) b) c) d) #12 #13 #14 #15 56. Which symbol would be used in a flowchart to represent a connection by a data communication link? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) #12 #13 #14 #15 57. In a document flowchart of a manual payroll processing system, "update employee file" will be shown by a(n) __________ symbol, and "prepare payroll check" will be shown by a(n) __________ symbol. a) b) c) d) input; output input; manual operation manual operation; output manual operation; manual operation 58. A flowchart is an analytical tool used to describe some aspect of an information system. A flowchart that depicts the relationships among the input, processing, and output of an AIS is a) b) c) d) an internal control flowchart. a document flowchart. a system flowchart. a program flowchart. 59. Which type of flowchart is an excellent vehicle for describing information flows and procedures within an AIS? a) b) c) d) a program flowchart a document flowchart an internal control flowchart a system flowchart 60. In a program flowchart comparison of one or more variables, the transfer of flow to alternative logic paths is represented by a) b) c) d) a terminal. data/information flow. computer operation. decision diamond. SHORT ANSWER 61. P62 50) What are the various ways to document a system? 62. P62 51) List the various types of flowcharts. 63. P 62-63 52) Briefly discuss the various levels of understanding necessary to deal with and comprehend AIS documentation. 64. P63 59) Name two reasons why it is important to have a working knowledge of DFDs and flowcharting. 65. What does SAS no. 94 require that is relevant to documentation tools? 66. P64 53) What are the basic elements of a data flow diagram? 67. P64 54) What are the basic symbols used in data flow diagrams? 68. P65 55) When does an analyst need to show two data flow lines in a DFD? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 69. P71 56) What are the four categories of flowcharting symbols? 70. P66 58) What are the different levels of DFDs? 71. P77 60) What is a system flowchart? What is a program flowchart? How are these two interrelated? 72. Ppp 57) How is a DFD different from a flowchart? ESSAY 73. Explain the relevance of the Sarbanes Oxley Act to the documentation tools you have studied in this chapter. 74. P 64-65 62) Discuss the idea of a data flow. 75. P66 or 69 61) What is the value of using a context diagram when working with DFDs? 76. P 69 63) Identify five important guidelines for drawing a DFD. Select one from your list and describe why it could be the most important one to consider when preparing a DFD. (Hint: You may want to support your argument with an example.) 77. P 71 64) Identify five important guidelines for drawing a flowchart. Select one from your list and describe why it could be the most important one to consider when preparing a flowchart. (Hint: You may want to support your argument with an example.) 78. Following is a context diagram for a current Payroll Processing System. ) Identify the data sources and destinations, data flows, and transformation process marked by question marks. ) What would you need to do to explode this diagram? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 79. Four flowcharts have been provided for the following descriptions. Identify the mistake(s) in each flowchart. Item a, below, corresponds to Figure a, then b, below, corresponds to figure b, and so on. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1) A 2) B 3) B 4) B 5) C 6) D 7) C 8) D 9) D 10) A 11) A 12) D 13) B 14) C 15) A 16) D 17) B 18) A 19) B 20) C 21) A 22) B 23) B 24) A 25) D 26) C 27) B 28) A 29) D 30) D 31) B 32) A 33) D 34) B 35) B 36) B 37) A 38) C 39) B 40) B 41) C 42) A 43) C 44) A 45) B 46) C 47) D 48) C 49) C 50) A 51) C 52) C 53) C 54) D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) 73) 74) A B D C D D Data flow diagrams, document flowcharts, system flowcharts, program flowcharts, and narrative documentation are the various ways to document a system. Document flowcharts, System flowcharts, Program flowcharts, Internal control flowcharts Depending on the job function of the professional, at a minimum a person should be able to read AIS and system documentation. A person may also be called upon to evaluate internal control system documentation in order to identify control strengths and weaknesses as well as recommend improvements. The AIS professional may be engaged to prepare documentation, which requires the greatest amount of skill and understanding of a particular system. First, data flow diagrams and flowcharts are the two most frequently used development and documentation tools used today. Second, since systems development is extremely complex, DFDs and flowcharts are tools that are used to create order from chaos and complexity. Statement on Auditing Standards (SAS) 94 requires that independent auditors understand the automated and manual procedures an entity uses. One of the best ways to gain this understanding is to use the flowcharts to document the internal control system, as weaknesses and strengths are more easily spotted from such graphic portrayals. Data sources and destinations, data flows, transformation processes, and data stores are the basic elements of a data flow diagram. The basic symbols used in data flow diagrams are: data source and destination - square box; data flows - arrow; processes - circle; and data stores - horizontal, parallel lines. A data flow may consist of one or more pieces of datum. The determining factor is whether the data elements always flow together at the same time. For example, "customer payment" have both payment and remittance data. Since these elements always flow together, only one data flow line is required. However, data flows between the customer and the payment processes have customer inquiries and cash receipts; these data items do not always flow together at the same time. In such a case, two data flow lines will be shown. The four categories of flowcharting symbols are: input/output, processing, storage, flow and miscellaneous. The highest-level or summary view DFD, which shows major inputs/outputs and a single process is called a context diagram. The DFD itself shows inputs, major processes, and outputs; each process in the DFD can be "exploded" or shown in greater level of detail with the sub-processes and related data flows. Computer systems flowcharts depict the relationships among the input, processing, and output of an AIS. The program flowchart illustrates the sequence of logical operations performed by a computer in executing a program. System flowcharts identify processing areas but do not show how the processing is done. The detailed logic used by the computer to perform the processing is shown on a separate program flowchart. The purpose of a DFD is to diagram the origins, flow, transformation, storage, and destination of data. The purpose a flowchart is to present a graphical description of the flow of documents, relationships among input, processing, and output, or the sequence of logical operations in an information system or program. A DFD is limited to basic symbols and lines, and focuses on the flow and use of data. A flowchart will generally be more complex, and more focused on the managerial, AIS, or IS aspects of the organization. The passage of the Sarbanes Oxley Act of 2002 made documentation skills even more important because it requires of public companies' management an annual internal control report. The auditor must evaluate this management assessment of internal control and attest to its accuracy. Therefore, the company and the auditors must document and test the internal controls -documentation tools, such as flowcharts, are used to do this. A data flow is a graphic representation of the flow of data between processes, data stores, and data sources and destinations. A data flow is really a form of communication. When the analyst draws a curved or straight line with an arrow at one end, what is represented is a form of communication Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 75) 76) 77) 78) 79) among the other elements of the data flow process. Consider for example a data source being depicted by a box. The box represents a data source. Data then is sent from the source to a circle, which represents a transformation process. The source of data sends the flow to the transformation process, which will process the data and somehow use the data or turn it into useful information. Note that data flows can represent one or more pieces of datum. Because data flows may have more than one data element, the analyst must determine whether to show one or more lines. Good DFDs and data flow lines in such diagrams eliminate the need for users and analysts to "infer" what type of information is flowing. In order to create a useful DFD, the analyst must determine system boundaries-what is to be included or excluded from the system. A context diagram will help to achieve this goal, since it is a good way to depict the boundaries of the system. The analyst first creates a context diagram by placing a circle in the middle of the diagram. The circle represents the system under consideration. On either side of the circle, boxes are created which represent outside entities the system interacts with directly. Data flow lines are drawn to show the direction of the flow of data. After this pictorial representation has been completed, the analyst can then better assess the boundaries of the system and amount of interaction between the system and outside entities. Understand the system. Ignore certain aspects of the system (such as control processes and control actions). Determine system boundaries. Develop a context diagram. Identify data flows. Group data flows. Identify transformation processes. Group transformation processes. Identify all files or data stores. Identify all data sources and destinations. All DFD elements are named. Subdivide the DFD. Give each process a sequential number. Repeat the process. Prepare a final copy. (Student answers will vary depending on the items chosen and the quality of their argument. The text provides various items that could be used to answer this question.) Use interviews, questionnaires, or narrative descriptions to understand the system before flowcharting it. Identify the different entities to be flowcharted such as departments, job functions, or external parties. Also identify documents and information flows along with the activities or processes performed on the data. Organize the flowchart using columns when several entities are involved in the process. Focus on the normal operations and include all relevant procedures and processes. Flowcharts should flow from top to bottom and from left to right. The origin and disposition of documents should be clearly identified by a clear beginning and end in the flowcharts. Use standard flowchart symbols. Multiple documents should be identified by numbers shown in the top right-hand corner of the document symbol. Documents do not directly connect with each other, except when moving from one column to another. Use on-page and off-page connectors to organize flowcharts. Use arrowheads to direct the flow of documents. Clearly label the pages, such as 1 of 3, 2 of 3, and 3 of 3. Documents or reports should be first shown in the column in which they originate and then moved to other columns. Use computer processing symbols to show movement of data in and out of the computer system. Filing operations can be directly shown with one line, no manual processing symbol required. Flowcharting is an iterative process. The first attempt should be a rough draft that is refined with each successive pass. Do not clutter flowcharts; redesign the flowchart as necessary. Review the flowchart for accuracy. On the final copy of the flowchart, the name of the flowchart, date, and the preparer's name should be shown. (Student answers will vary depending on the items chosen and the quality of their argument. The text provides various items that could be used to answer this question.) 1 - Human resources, 2 - Time cards, 3 - Payroll processing system, 4 - Employee paychecks or pay-stubs, 5- Payroll report, 6 - Government agencies, 7- Banks. To explode this diagram, additional information is needed to identify detailed procedures within the payroll processing activity as well as additional inputs and outputs. It would be useful to obtain a comprehensive narrative of the payroll processing procedures for review and identification of these items. If there is no narrative available, interviews are another source of information. a. Figure a - the sort symbol should be manual operation symbol. Figure b - the file update symbol should be computer processing and the arrow from transaction file should flow into file update. Figure c - the arrows should point from left to right and the computer processing symbol is missing before the master file.. Figure d - the sort symbol is manual and should be computer processing, checks are endorsed manually but the symbol is for computer processing and endorsed checks are sent to the bank, hence the file symbol is wrong. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 4 MULTIPLE CHOICE 1. What is the most popular type of database? a) b) c) d) hierarchical relational object-oriented network 2. Using a file-oriented approach to data and information, data is maintained in a) b) c) d) a central database. many interconnected files. many separate files. a decentralized database. 3. File-oriented approaches create problems for organizations because of a) b) c) d) multiple transaction files. a lack of sophisticated file maintenance software. multiple users. multiple master files which may contain redundant data. 4. Which statement is true regarding file systems? a) Transaction files are similar to ledgers in a manual AIS. b) The proliferation of master files creates problems in the consistency of specific data stored in different files. c) Transaction files are permanent. d) Individual records are never deleted in a master file. 5. A set of interrelated, centrally coordinated files is called a) b) c) d) a database. a master file. a transaction file. a multiple-records grouping (MRG). 6. The software program that creates, manipulates, and accesses the database goes by the acronym a) b) c) d) DBMS. DBP. OS. DBA. 7. The ___________ acts as an interface between the database and the various application programs a) b) c) d) Data warehouse Database administrator Database management system Database system 8. The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) Data warehouse Database administrator Database system Database manager 9. The person responsible for the database is the a) b) c) d) Data coordinator Database administrator Database manager Database master 10. All of the following are benefits of database technology except: a) b) c) d) Data integration and sharing Decentralized management of data Minimal data redundancy Reporting flexibility 11. Separating the logical and physical views in a database allows the programmers to concentrate on coding the application logic a) b) c) d) by identifying physical location and layouts of various data items. since they do not have to focus on the physical location and layouts of various data items. by consolidating all data in one database. by providing pointers to data items regardless of physical location. 12. A database system separates the logical and physical view of data. Such separation facilitates the development of new applications since programmers can concentrate their efforts on coding application logic. The term physical view refers to a) b) c) d) how a user or programmer conceptually organizes and understands the data. how the DBMS accesses data for an certain application program. how and where the data are physically arranged and stored. how master files maintain facts used by certain application programs. 13. The ____________ handles the link between the way data are physically stored and each user's logical view of that data. a) b) c) d) Data warehouse Database administrator Database management system software Schema 14. The logical structure of a database is described by the a) b) c) d) dictionary. schema. subschema. internal level. 15. Schemas are used in designing database systems. The schema that provides an organization-wide view of the entire database is known as a) the external-level schema. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) the internal-level schema. c) the conceptual-level schema. d) the logical view of the database. 16. A set of individual user views of the database is called the a) b) c) d) schema. internal-level schema. external-level schema. meta-schema. 17. A low-level view of the database that describes how the data are actually stored and accessed is the a) b) c) d) schema. subschema. internal-level schema. external-level schema. 18. Record layouts, definitions, addresses, and indexes will be stored at the __________ level schema. a) b) c) d) external conceptual internal inner 19. Accountants may be involved in several aspects of database development. In which area below would an accountant least likely have involvement when developing a database system? a) b) c) d) the conceptual-level schema the external-level schema the internal-level schema the logical view of data 20. The ____________ contains information about the structure of the database. a) b) c) d) Data definition language Data dictionary Data warehouse Database management system 21. Which of the following would not be found in a data dictionary entry for a data item? a) b) c) d) records containing a data item the physical location of the data the source of the data item the field (data) type 22. The data dictionary usually is maintained a) b) c) d) automatically by the DBMS. by the database administrator. by the database programmers. by top management. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 23. Reports produced using the data dictionary could include all of the following except a) b) c) d) a list of all programs where a data item is used. a list of all synonyms for the data items in a particular file. a list of all outputs where a data element is used. a list of all the schemas included in a database. 24. One of the key components of a DBMS is the data dictionary, which contains information about the structure of the database. Which would not generally be considered a data dictionary output report? a) b) c) d) a list of cash balances in the organization's bank accounts a list of all programs in which a data element is used a list of all synonyms for the data elements in a particular file a list of all data elements used by a particular user 25. The DBMS language that is used to build, initialize, and describe logical views for users is called the a) b) c) d) DDL. DML. DQL. DBA. 26. The DBMS language that is used for data maintenance and updating of the database is referred to by the letters a) b) c) d) DDL. DML. DQL. SQL. 27. A DBMS must provide a way to define, manipulate, and query data in a database. This is accomplished by the use of three different languages. The language that is used to provide the function of data maintenance in a DBMS is a) b) c) d) DDL. DML. DQL. report writer. 28. The part of the DBMS that is used to interrogate the database and present subsets of the database to users is called the a) b) c) d) DDL. DML. DQL. DBA. 29. DBMS uses a language to retrieve, sort, order, and present subsets in a database. This language is known as a) b) c) d) data definition language (DDL). data manipulation language (DML). data query language (DQL). report writer. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 30. Creating an empty table in a relational database requires use of the __________, and filling that table requires the use of __________. a) b) c) d) DDL; DML DQL; SQL DDL; DQL DML; DDA 31. Many database systems include a feature that simplifies the creation of reports by allowing users to specify the data elements desired and the format of the output. This feature is named the __________. a) b) c) d) report writer report generator report creator report printer 32. The abstract representation of the contents of a database is called the logical a) b) c) d) data model. data dictionary. data relationship. subschemas. 33. A database model that represents all data as stored in two-dimensional tables is the __________ model. a) b) c) d) tuple relational hierarchy object 34. Each row in a relational database's table is known as a a) b) c) d) data model relation schema tuple 35. The attribute that can uniquely identify a specific row in a table is the a) b) c) d) primary key secondary key foreign key logical key 36. An attribute in a table that is a primary key in another table. a) b) c) d) primary key secondary key foreign key anomaly 37. Redundancy can be a major problem in the design and operation of relational databases. If a database uses only one relation to store data, several problems may Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 subsequently occur. The problem of changes (or updates) to data values being incorrectly recorded is known as a) b) c) d) an update anomaly. an insert anomaly. a delete anomaly. a memory anomaly. 38. The potential inconsistency problem could arise when there are multiple occurrences of a data item in a database. This is called the a) b) c) d) update anomaly. insert anomaly. inconsistency anomaly. integrity anomaly. 39. The problem of inability to add new data without violating the basic integrity of the database is referred to as the a) b) c) d) update anomaly. insert anomaly. integrity anomaly. add anomaly. 40. A relational database has been designed where the customer data is not maintained independently of sales invoice data. This design weakness will most likely result in a) b) c) d) an update anomaly. an insert anomaly. a delete anomaly. no anomaly. 41. The problem of losing desired information from a database when an unwanted record is purged from the database is referred to as the __________ anomaly. a) b) c) d) purge erase delete integrity 42. One important constraint in a relational database environment is that a primary key uniquely identifies each row in a data table. This principle is called the a) b) c) d) entity integrity rule. referential integrity rule. unique primary key rule. foreign key rule. 43. The database constraint that says that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the a) b) c) d) entity integrity rule. referential integrity rule. rule of keys. referential entity rule. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 44. A well-structured or "normalized" database imposes several requirements on the structure of tables. The constraint that ensures the consistency of the database is known as a) b) c) d) the entity integrity rule. the referential integrity rule. the logical view. the physical view. 45. Which statement below is false regarding the basic requirements of the relational data model? a) "Every column in a row must be single-valued." b) "All nonkey attributes in a table should describe a characteristic about the object identified by the primary key." c) "Foreign keys, if not null, must have values that correspond to the value of a primary key in another table." d) "Primary keys can be null." 46. Identify the aspect of a normalized database that is incorrect: a) b) c) d) Data is consistent. Redundancy is minimized and controlled. All data is stored in one table or relation. The primary key of any row in a relation cannot be null. 47. In the database design approach known as normalization, the first assumption made about data is a) b) c) d) there is no redundancy in the data. the delete anomaly will not apply since all customer records will be maintained indefinitely. everything is initially stored in one large table. the data will not be maintained in 3NF tables. 48. The process of designing a database that is well-structured and free from anomalies is called a) b) c) d) normalization. anormalization. data modeling. manipulation. 49. Normalization means tables are in the __________ normal form. a) b) c) d) first second third fourth 50. There are two basic ways to design a well-structured relational database. The method in which a database designer uses knowledge about how business processes work to draw a graphical picture of the elements to be included in the database is called a) normalization. b) decentralization. c) geometric data modeling. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) semantic data modeling. 51. Which of the statements below is incorrect regarding semantic data modeling? a) It facilitates the efficient design of transaction processing databases. b) It facilitates communicating with the intended users of the system. c) It allows a database designer to use knowledge about how the business processes work to design the database. d) Semantic data modeling simply follows the rules of normalization in the design of a database. 52. What is one potential drawback in the design and implementation of database systems for accounting? a) Double-entry accounting relies on redundancy as part of the accounting process; well-designed database systems reduce and attempt to eliminate redundancy. b) Relational DBMS query languages will allow financial reports to be prepared to cover whatever time periods managers want to examine. c) Relational DBMS provide the capability of integrating financial and operational data. d) Relational DBMS can accommodate multiple views of the same underlying phenomenon; therefore, tables storing information about assets can include data about both historical and replacement costs. 53. Which is probably the most significant effect of database technology on accounting? a) b) c) d) replacement of the double entry-system change in the nature of financial reporting elimination of traditional records such as journals and ledgers quicker access to and greater use of accounting information in decision-making SHORT ANSWER 54. Define and distinguish between these terms: database, database management system, database system and database administrator. 55. What is a major advantage of database systems over file-oriented transaction processing systems? 56. What is the difference in logical view and physical view? 57. Describe the different schemas involved in a database structure. What is the role of accountants in development of schemas? 58. What is a data dictionary? 59. List the four languages used within a DBMS. 60. Name the three "anomalies" that may occur in an improperly designed relational database? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 61. Name the types of attributes that tables possess in a relational database. 62. Briefly explain the two advantages semantic data modeling has over normalization when designing a relational database. ESSAY 63. What is the difference between file-oriented transaction processing systems and relational database systems? Discuss the advantages and disadvantages of these systems. 64. Discuss redundancy as it applies to database design. 65. Discuss the ways in which a well-designed DBMS will facilitate the three basic functions of creating, changing, and querying data. 66. List the four DBMS "languages." Provide a brief description which identifies who uses them and for what purpose. 67. Describe the information that is contained in the data dictionary. 68. Discuss the relational database data model. 69. What are the main constraints when a relational database model is being logically designed? 70. What do you think will be the main impact of database technology in your career? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1) B 2) C 3) D 4) B 5) A 6) A 7) C 8) C 9) B 10) B 11) B 12) C 13) C 14) B 15) C 16) C 17) C 18) C 19) C 20) B 21) B 22) A 23) D 24) A 25) A 26) B 27) B 28) C 29) C 30) A 31) A 32) A 33) B 34) D 35) A 36) C 37) A 38) A 39) B 40) B 41) C 42) A 43) B 44) B 45) D 46) C 47) C 48) A 49) C 50) D 51) D 52) A 53) D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 54) A database is a set of interrelated, centrally coordinated files. A database management system acts as an interface between the database and the various application programs. A database system refers to the combination of the database, the DBMS and the application programs. A database administrator is the person responsible for the database. 55) Database systems separate logical and physical views. This separation is referred to as programdata independence. Such separation facilitates developing new applications because programmers can concentrate on coding the application logic (what the program will do) and do not need to focus on how and where the various data items are stored or accessed. In the file-oriented transaction systems, programmers need to know physical location and layout of records which adds another layer of complexity to programming. 56) The logical view is how the user or programmer conceptually organizes and understands the data, such as data organized in a table. The physical view, on the other hand, refers to how and where the data are physically arranged and stored on a disk, tape, or CD-ROM media. 57) A schema describes the logical structure of a database. There are three levels of schemas. First, the conceptual-level schema is an organization-wide view of the entire database listing all data elements and relationships between them. Second, an external-level schema is a set of individual user views of portions of the database, each of which is referred to as a subschema. Finally, an internal-level schema provides a low-level view of the database includes descriptions about pointers, indexes, record lengths, etc. Accountants are primarily involved in the development of conceptual- and external-level schemas; however, database knowledgeable accountants may participate in developing an internal level schema. 58) A data dictionary is a means by which information about the structure of a database is maintained. For each data element stored in the database, there is a corresponding record in the data dictionary that describes it. The DBMS usually maintains the data dictionary. Inputs to the dictionary include various new data, changed data, and deleted data. Output from the data dictionary may include a variety of reports useful to programmers, database designers, and other users of the information system. Accountants have a very good understanding of the data elements that exist in a business organization, so when an organization is developing a database, accountants should be allowed to participate in the development of the data dictionary. 59) The four languages used within a DBMS are data definition language, data manipulation language, data query language, and a report writer. 60) Update, insert, and delete 61) Primary key - the attribute, or combination of attributes, that uniquely identify a specific row in a table. Foreign key - an attribute appearing in one table that is a primary key in another table. Nonkey attributes found in tables - For example, an inventory table may contain information about the description, quantity on hand, and list price of each item a company sells. 62) Semantic data modeling takes advantage of a system designer's knowledge about the business policies and practices of an organization. This is of great benefit in the design of transaction processing databases. Also, since the database model is created around the policies and practices of an organization, communications with the future database users is facilitated. The result is that the system will more closely meet the needs of the intended users. 63) In file-oriented approaches, different users (or departments, units, etc.) maintain their own data and use different application programs. This results in a significant increase in number of master files stored by an organization. The various disadvantages of file-oriented organization include data redundancy, data inconsistencies, lack of data integration, a large number of data files, substantial program-data dependence, lack of compatibility, and lack of data sharing. The database approach views data as an organizational resource that should be used and managed for the entire organization. The program that manages and controls the data and the interfaces between data and application programs is called the database management system (DBMS). The various advantages of database approach include the following: minimal data redundancy, fewer data inconsistencies, data integration, data sharing, reporting flexibility, central management of data, cross-functional analysis, and data independence. 64) Redundancy has been called an enemy of relational databases. There are several problems that may occur when redundant data is stored in a database. First, the database becomes larger than it needs to be, since duplicate facts are being stored within it. Second, a situation may occur where only one instance of redundant data is updated or purged. The result is that the accuracy and Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 65) 66) 67) 68) 69) 70) integrity of the database suffers, since users may be relying on such inaccurate or incorrect redundant data. Redundancy can also make file maintenance unnecessarily time consuming and error-prone when human intervention is required. The problems discussed above have been identified as anomalies of a relational database. There are three specific anomalies connected with redundancy: the update anomaly, the insert anomaly, and the delete anomaly. A well-designed relational database will attempt to reduce or eliminate the number of instances of redundant data. The best way to achieve such a goal is proper design of the database for the needs of a specific organization. A DBMS will use data definition, data manipulation, and data query languages in order to perform the three basic, essential data functions. Data definition is achieved using DDL (data definition language); data manipulation is achieved using DML (data manipulation language) which includes operations such as updating, inserting, and deleting portions of the database. DQL (data query language) is used to retrieve, sort, order, and present subsets of data in response to user queries. A DBMS will probably also include a report writer, which is a language that simplifies report creation. DDL is the data definition language used by the DBA (database administrator) to create, initialize, describe logical views, and specify security limits. The DML is the data manipulation used by application programmers who embed these action commands into applications to access data in the database. The DQL is the data query language used by IT professionals and users to interrogate the database by retrieving and presenting data in novel ways often on an ad hoc basis. The report writer is a language used by IT professionals and users that simplifies report creation so reports can be created according to user-specified format. The data dictionary contains information about the structure of the data base. For each data element stored in the database, the data dictionary contains all the descriptive information about it, such as its name, description, where it is recorded, its source, field length, type of field, programs it is used in, outputs that contain it, and authorized users. A data model is an abstract representation of the contents of a database. The majority of new DMBS use what is called the relational data model, developed by Dr. E. F. Codd in 1970. Using this model, everything in the database is stored in the form of tables, known as relations. Keep in mind that this is the conceptual- and external-level schemas (which describes the logical structure of a database), not the actual physical structure of the database itself. In the concept of relations, both rows and columns comprise the database tables. Each row in a relation (table) is called a tuple. Tuples contain data about a specific occurrence of the type of entity represented by that table. For example, in a sales table, each tuple may contain all of the information about a specific customer. Each column in a relation contains information about one specific attribute of that entity. Using the sales example again, the columns in such a table may represent specific characteristics about each sales transaction. Every row in every table must have a unique key known as a primary key. Tables may also have a key known as a foreign key; such a key will have a value corresponding to the primary key in another table. Each column in a table must be single-valued (the same data type) and describe an attribute of the entity identified by the primary key; neither column nor row order is significant in the relational model. Keep in mind that the relational model is a logical model, and the physical model may have a different structure to it to facilitate the storage and access to data. Answers to this question could cover a wide range. Most likely the following items will be discussed or mentioned: -- the probable demise of the double-entry system as the need for such redundancy is much less in a database system. -- financial reporting may become more of accessing a database of corporate data in the format desired by the user than relying on financial reports prepared by accountants. -- accountants will no longer need to be the filter for accounting data as users will be able to do this themselves, thus the accountants may become more decision makers and managers. -- the whole notion of internal controls will become more important in the future if the accountants' role changes in relation to financial reporting Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 5 MULTIPLE CHOICE 1. Perhaps the most striking fact about natural disasters in relation to AIS controls is that a) b) c) d) many companies in one locale can be seriously affected at one time by a disaster. losses are absolutely unpreventable. there are a large number of major disasters every year. disaster planning has largely been ignored in the literature. 2. There are four distinct types of threats to an AIS: 1) software errors and equipment malfunctions; 2) unintentional acts; 3) intentional acts; and 4) __________. a) b) c) d) computer fraud data transmission errors human carelessness natural and political disasters 3. Which AIS threat below would be classified an unintentional act? a) b) c) d) a power outage sabotage high winds a logic error 4. Which AIS threat below would be classified as a natural or political disaster? a) b) c) d) Accident Corruption Power outage Terrorist attack 5. Which AIS threat below would be classified a computer crime? a) b) c) d) Innocent error Operating system crash Sabotage Terrorist attack 6. Which AIS threat below would be classified as a software error or equipment malfunction? a) b) c) d) Earthquake Logic error Operating system crash Sabotage 7. An expert from the Information Systems Security Association estimates that the largest single source of security problems for systems is due to a) b) c) d) human errors and omissions. physical threats such as natural disasters. dishonest employees. fraud and embezzlement. 8. Fraud is any and all means a person uses to gain an unfair advantage over another person. Current and former employees of an organization are much more likely to Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 perpetrate fraud than external parties. The act by a person or group of persons resulting in materially misleading financial statements is called a(n) a) b) c) d) misappropriation of assets. employee fraud. fraudulent financial reporting. theft of assets. 9. Most fraud perpetrators are insiders because a) b) c) d) insiders are more dishonest than outsiders. insiders know more about the system and its weaknesses than outsiders. outsiders are more likely to get caught than insiders. insiders have more need for money than outsiders. 10. A majority of fraud perpetrators are a) b) c) d) outsiders. employees. computer hackers. vendors. 11. Misappropriation of assets can also be called a) b) c) d) Computer fraud Employee fraud Fraudulent financial reporting Management fraud 12. Intentional or reckless conduct that results in materially misleading financial statements is called a) b) c) d) financial fraud. misstatement fraud. fraudulent financial reporting. audit failure fraud. 13. The Treadway Commission studied 450 lawsuits against auditors and found that a) b) c) d) misappropriation of assets was the reason for over one-half of the suits. fraudulent financial reporting was the reason for over one-half of the suits. white-collar criminals were responsible for only a fraction of the lawsuits. only in a very few cases were financial statements falsified. 14. Researchers have compared the psychological and demographic characteristics of white-collar criminals, violent criminals, and the general public. They found that a) b) c) d) few differences exist between white-collar criminals and the general public. white-collar criminals eventually become violent criminals. most white-collar criminals invest their illegal income rather than spend it. most white-collar criminals are older and not technologically proficient. 15. Which of the factors listed below is not a common factor for fraud? a) pressure to commit fraud b) opportunity to commit fraud c) desire to get even with the employer Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) rationalization for the crime 16. Reasons for committing a fraud include living beyond one's means, having heavy debts, or unusually high bills. Such a motivator for committing a fraud is commonly known as a a) b) c) d) spark. pressure. flash-point. catalyst. 17. Which of the following motivators would be a good indication of financial pressure that would contribute to employee fraud? a) b) c) d) a big change for the better in an employee's lifestyle an employee suddenly acquires lots of credit cards inadequate internal controls too close association with suppliers or customers 18. Which of the following emotions could cause an employee to feel pressured to defraud his employer? a) b) c) d) a feeling of not being appreciated failing to receive a deserved promotion believing that their pay is too low relative to others around them All of the above emotions could be sources of pressure. 19. There are three characteristics associated with most fraud. The characteristic that often takes more time and effort and leaves behind more evidence than other types of fraud is called a) b) c) d) theft. conversion. concealment. embezzlement. 20. In many cases of fraud, the __________ takes more time and effort than the __________ is worth. a) b) c) d) concealment; theft theft; concealment conversion; theft conversion; concealment 21. What is one common way to hide a theft? a) by creating cash through the transfer of money between banks b) by the conversion of stolen assets into cash c) by stealing cash from customer A and then using customer B's balance to pay customer A's accounts receivable d) by charging the stolen item to an expense account 22. In a __________ scheme, customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts. a) kiting Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) laundering c) bogus expense d) lapping 23. One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as a) b) c) d) lapping. misappropriation of assets. kiting. concealment. 24. Characteristics connected with fraud include pressures, opportunities, and rationalizations. Of these characteristics, which one often stems from a lack of internal controls within an organization? a) b) c) d) pressures opportunities rationalizations none of the above 25. Which situation below makes it easy for someone to commit a fraud? a) b) c) d) the organization placing excessive trust in key employees inadequate staffing within the organization company policies within the organization are unclear All of the above situations make it easy for someone to commit a fraud. 26. What is the most prevalent opportunity within most companies to commit fraud? a) b) c) d) the failure to have any internal controls the failure to enforce the system of internal controls the failure to have the correct controls the failure to realize that fraud could occur 27. Characteristics connected with fraud include pressures, opportunities, and rationalizations. Of these characteristics, which one relates to excuses that perpetrators have allowing them to justify their illegal behavior? a) b) c) d) pressures opportunities rationalizations none of the above 28. The US Justice Department defines computer fraud as a) b) c) d) any crime in which a computer is used. an illegal act in which knowledge of computer technology is essential. any act in which cash is stolen using a computer. an illegal act in which a computer is an integral part of the crime. 29. Computer fraud is often much more difficult to detect than other types of fraud because a) perpetrators usually only steal very small amounts of money at a time, thus requiring a long period of time to have elapsed before they're discovered. b) perpetrators can commit a fraud and leave little or no evidence. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) most perpetrators invest their illegal income rather than spend it, thus concealing key evidence. d) most computer criminals are older and are considered to be more cunning when committing such a fraud. 30. Why is computer fraud often more difficult to detect than other types of fraud? a) b) c) d) Rarely is cash stolen in computer fraud. The fraud may leave little or no evidence it ever happened. Computers provide more opportunities for fraud. Computer fraud perpetrators are just cleverer than other types of criminals. 31. Many fraud cases go unreported and unprosecuted for several reasons. Why is this the case? a) Companies are reluctant to report computer crimes because a highly visible computer fraud is a public relations nightmare. b) Such crimes are difficult, costly, and time-consuming to investigate and prosecute. c) Law enforcement and the courts are often too busy with violent crimes that little time is left for fraud cases. d) all of the above 32. Computer fraud can be analyzed using the traditional data processing model. According to this model, the simplest and most common fraud is __________ fraud. a) b) c) d) input processor computer instructions output 33. The simplest and most common way to commit a computer fraud is to a) b) c) d) alter computer input. alter computer output. modify the processing. corrupt the data base. 34. Computer fraud has been categorized into several different classifications. The classification of computer fraud where the perpetrator causes a company to pay for ordered goods, or to pay for goods never ordered is called a) b) c) d) disbursement fraud. inventory fraud. payroll fraud. cash receipts fraud. 35. In a disbursement fraud the company a) b) c) d) pays too much for ordered goods. pays for goods never received. laps cash payments at the bank. Both A and B are correct. 36. How can funds be stolen in payroll fraud? a) by paying a fictitious or ghost employee b) by increasing pay rates without permission c) by keeping a real but terminated employee on the payroll Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) All of the above situations are possible. 37. Stealing a master list of customers and selling it to a competitor is an example of a) b) c) d) data theft. output theft. disbursement fraud. a trap door technique. 38. One computer fraud technique is known as data diddling. What is it? a) gaining unauthorized access to and use of computer systems, usually by means of a personal computer and a telecommunications network b) unauthorized copying of company data such as computer files c) unauthorized access to a system by the perpetrator pretending to be an authorized user d) changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data 39. What is a denial of service attack? a) A denial of service attack occurs when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server. b) A denial of service attack occurs when an e-mail message is sent through a re-mailer, who removes the message headers making the message anonymous, then resends the message to selected addresses. c) A denial of service attack occurs when a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected. d) A denial of service attack occurs when the perpetrator e-mails the same message to everyone on one or more Usenet newsgroups LISTSERV lists. 40. The unauthorized copying of company data is known as a) b) c) d) Data leakage Eavesdropping Masquerading Phishing 41. The unauthorized access to and use of computer systems a) b) c) d) Hacking Hijacking Phreaking Sniffing 42. Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises? a) b) c) d) dumpster diving by use of a Trojan horse using a telescope to peer at paper reports electronic eavesdropping on computer monitors 43. Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called a) hackers. b) crackers. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) phreakers. d) jerks. 44. Gaining control of someone else's computer to carry out illicit activities without the user's knowledge a) b) c) d) Hacking Hijacking Phreaking Sniffing 45. Illegally obtaining and using confidential information about a person for economic gain a) b) c) d) Eavesdropping Identity theft Packet sniffing Piggybacking 46. Which of the following is not a method of identify theft a) b) c) d) Scavenging Phishing Shoulder surfing Phreaking 47. Which method of fraud is physical in its nature rather than electronic? a) b) c) d) cracking hacking eavesdropping scavenging 48. When a computer criminal gains access to a system by searching records or the trash of the target company, this is referred to as a) b) c) d) data diddling. dumpster diving. eavesdropping. piggybacking. 49. A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a a) b) c) d) trap door. data diddle. logic bomb. virus. 50. The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called __________. a) b) c) d) cracking. masquerading. hacking. superzapping. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 51. Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called a) b) c) d) superzapping. data leakage. hacking. piggybacking. 52. A fraud technique that slices off tiny amounts from many projects is called the __________ technique. a) b) c) d) Trojan horse round down salami trap door 53. Spyware is a) b) c) d) Software that tells the user if anyone is spying on his computer Software that monitors whether spies are looking at the computer Software that monitors computing habits and sends the data it gathers to someone else None of the above 54. The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called a) b) c) d) a Trojan horse. a trap door. the salami technique. superzapping. 55. Computer fraud perpetrators have developed many methods to commit their acts. One way is to modify programs during systems development allowing access into the system that bypasses normal system controls. This is known as a) b) c) d) a Trojan horse. a trap door. the salami technique. superzapping. 56. A fraud technique that allows the hacker to bypass normal system controls and enter a secured system is called a) b) c) d) superzapping. data diddling. using a trap door. piggybacking. 57. A set of unauthorized computer instructions in an otherwise properly functioning program a) b) c) d) Logic bomb Spyware Trap door Trojan horse Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 58. A __________ is similar to a __________, except that it is a program rather than a code segment hidden in a host program. a) b) c) d) worm; virus Trojan horse; worm worm; Trojan horse virus; worm 59. Which type of antivirus program is most effective in spotting an infection soon after it starts? a) b) c) d) a virus protection program a virus identification program a virus detection program none of the above 60. How can an organization reduce fraud losses? a) b) c) d) encrypt data and programs use forensic accountants maintain adequate insurance require vacations and rotate duties SHORT ANSWER 61. Define fraud. 62. What are the two kinds of fraud in business? 63. What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting? 64. What are the three common things that happen in a fraud? 65. What techniques are used to conceal theft by fraud? 66. What is a computer fraud? 67. Why is computer fraud on the rise? 68. How can a system be protected from viruses? 69. Discuss antivirus software programs. 70. How does a company make fraud less likely to occur? 71. How can companies reduce losses from fraud? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ESSAY 72. What are some of the distinguishing characteristics of fraud perpetrators? 73. What is the difference between a worm and a virus? 74. What are some of the computer fraud techniques used by perpetrators? 75. Why do fraudulent acts often go unreported and are therefore not prosecuted? ANSWER KEY 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) A D D D C C A C B B B C B A C B A D C A D D C B D B C B B B D A A A D D A D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) 67) 68) A A A D C B B D D B C B D C C D B C D A D C Fraud is any means a person uses to gain an unfair advantage over another. Fraud usually involves the misrepresentation of facts about a situation and the reliance on that misrepresentation by the victim. Frauds are often called "cons" because they involve a violation of trust or confidence. Employee Fraud is a misappropriation of assets, or theft, by a person or group for personal financial gain. Fraudulent financial reporting is intentional or reckless conduct that results in materially misleading financial statements. Establish an organizational environment that contributes to the integrity of the financial reporting process. Identify and understand the factors that lead to fraudulent financial reporting. Assess the risk of fraudulent financial reporting within the company. Design and implement controls to provide reasonable assurance that the fraudulent financial reporting is prevented Theft of an asset. Conversion to cash (if not already cash). Concealment of the crime Some techniques used to conceal theft by fraud are charging stolen assets to an expense account, lapping or misapplying cash payments from customers and stealing part of the receipts, kiting or creating fictitious bank balances by shuttling monies between bank accounts, and playing the bank float, then stealing some of the cash. Computer fraud is any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. Not everyone agrees on what constitutes computer fraud and some people may commit computer fraud unwittingly and not be aware of it. Many computer frauds go undetected. The belief that "it just can't happen to us". Most networks have a low level of security. Many Internet sites provide guidance on how to commit computer crimes. Law enforcement is unable to keep up with the number of computer frauds. Most frauds are not reported. The total dollar value of losses is difficult to calculate. Install reliable antivirus software that scans for, identifies, and isolates or destroys viruses. Use caution when copying files on to your diskettes from unknown machines. Ensure the latest versions of the antivirus program available is used. Scan all incoming emails for viruses at the server level. All software should be certified as virus-free before loading it into the system. If you use jump drives, diskettes, or CDs, do not put them in unfamiliar machines as they may become infected. Obtain software and diskettes only from known and trusted sources. Use caution when using or purchasing software or diskettes from unknown sources. Deal with trusted software retailers. Ask whether the software you are purchasing comes with electronic techniques that makes tampering evident. Check new software on an isolated machine with virus detection software before installing on the system. Cold boot to clear and reset the system. When necessary, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 69) 70) 71) 72) 73) 74) 75) "cold boot" the machine from a write-protected diskette. Have two backups of all files. Restrict the use of public bulletin boards. There are three types of antivirus software programs. Virus protection programs are designed to remain in computer memory and search for viruses trying to infiltrate the system. When an infection attempt is detected, the software freezes the system and flashes a message to the user. Virus detection programs spot an infection soon after it starts. Virus identification programs scan all executable programs to find and remove all known viruses from the system. A company can decrease fraud by: good hiring and firing practices; good management of unhappy employees; training in fraud awareness; manage and track computer licenses; implement signed confidentiality agreements; maintain visible security; educate the workforce in ethics and the penalties for illegal acts. Maintain adequate insurance. Keep a current backup copy of all program and data files in a secure off-site location. Develop a contingency plan for fraud occurrences and other disasters that might occur. Use special software designed to monitor system activity and help companies recover from frauds and malicious actions. Some distinguishing characteristics of fraud perpetrators are: they tend to spend their illegal income to support their lifestyle; once they begin it becomes harder to stop and they become bolder as each incident happens; once they start to rely on the ill-gotten gains, they become more greedy and sometimes careless and overconfident. In the case of computer criminals, they are often young and have substantial computer knowledge. About two-thirds are men and likely to be an employee of the firm from which they steal. Many are unhappy or disgruntled with their employer because they feel unappreciated and underpaid. Most have no previous criminal record. A computer virus is a segment of executable code that attaches itself to computer software. A virus has two phases: it replicates itself and spreads to other systems or files, and in the attack phase, the virus carries out its mission to destroy files or the system itself. A worm is similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm can reside in e-mail attachments, which when opened or activated can damage a user's system. Worms can also reproduce themselves by mailing themselves to the addresses found in the recipient's mailing list. Worms do not have long lives, but their lives can be very destructive nonetheless. Various computer fraud techniques include: Trojan horse - unauthorized code hidden in a legitimate program. Round-down technique - rounded off amounts from calculations and the fraction deposited in perpetrator's account. Salami technique - small amounts sliced off and stolen from many projects over a period of time. Trap door - bypass of normal system controls. Superzapping - use of a special program to bypass regular controls. Software piracy - unauthorized copying of software, probably the most committed computer crime. Data diddling - changing data in an unauthorized way. Data leakage - unauthorized copying of data files. Piggybacking - latching onto a legitimate user in data communications. Masquerading or Impersonation - the perpetrator gains access to the system by pretending to be an authorized user. Social engineering - a perpetrator tricks an employee into giving him the information he needs to get into the system. Logic bomb - idle until some event or time triggers it. Hacking - unauthorized access and use of a computer system. Scavenging - gaining access to confidential data by searching corporate records in dumpsters or computer storage. Eavesdropping - observation of private communications by wiretapping or other surveillance techniques. E-mail threats - threatening legal action and asking for money via e-mail. E-mail forgery - removing message headers, using such anonymous e-mail for criminal activity. Denial of service attack - sending hundreds of e-mail messages from false addresses until the attacked server shuts down. Internet terrorism - crackers using the Internet to disrupt electronic commerce and communication lines. Internet misinformation - using the Internet to spread false or misleading information. War dialing - searching for idle modem by dialing thousands of telephones and intruding systems through idle modems. Spamming - e-mailing the same message to everyone on one or more Usenet groups. Most fraud cases go unreported and are not prosecuted for several reasons. Many cases of computer fraud are as yet still undetected. As new technology and methods become available to organizations, prior undetected fraud may be revealed in the future. A second reason is that companies are reluctant to report computer fraud and illegal acts simply because of bad publicity-a highly visible case can undermine consumer confidence in an organization such as a financial Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 institution. Also, the fact that a fraud has occurred may indeed encourage others to attempt to commit further acts against the organization. It would seem that unreported fraud creates a false sense of security, as people think systems are more secure than they are in reality. Another reason for not reporting fraudulent acts is the fact that the court system and law enforcement is busy with violent crimes and criminals in its system. There is little time left to go after a crime where no physical harm is present. Also, the court system tends to treat teen hacking and cracking as "acts of childhood" rather than as serious crimes--this leads to many plea bargains when a computer fraud is brought to trial. Another reason is that a computer fraud case is difficult, costly, and timeconsuming to investigate and prosecute. Before 1986 no federal law existed governing computer fraud. Law enforcement officials, lawyers, and judges generally lack the computer skills necessary to properly evaluate, investigate, and prosecute computer crimes. Sadly, when all is said and done a successful prosecution and conviction of computer fraud results in a very light sentence. All of these factors contribute to the underreporting and lack of prosecution of computer fraud crimes. Not everyone agrees on what constitutes computer fraud: Many networks have a low level of security Many Internet pages give instruction on how to carry out computer crimes Law enforcement has difficulty keep up with the growing number of computer frauds The total dollar value of losses from computer fraud is difficult to estimate. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 6 MULTIPLE CHOICE 1. What is one reason why AIS threats are increasing? a) b) c) d) LANs and client/server systems are easier to control than centralized, mainframe systems. Many companies do not realize that data security is crucial to their survival. Computer control problems are often overestimated and overly emphasized by management. Many companies believe that protecting information is a strategic requirement. 2. Which of the following is not a reason for the increase in security problems for AIS? a) b) c) d) Confidentiality issues caused by interlinked inter-company networks Difficult to control distributed computing networks Increasing efficiency resulting from more automation Increasing numbers of information systems and users 3. One reason why many organizations do not adequately protect their systems is because a) control problems may be overestimated by many companies. b) productivity and cost cutting cause management to forgo implementing and maintaining internal controls. c) control technology has not yet been developed. d) all of the above 4. Any potential adverse occurrence or unwanted event that could be injurious to either the AIS or the organization is referred to as a(n) a) b) c) d) threat. exposure. risk. phenomenon. 5. The potential dollar loss that could result if an unwanted event occurs is called a(n) a) b) c) d) threat. exposure. risk. extraordinary loss. 6. The likelihood that an adverse or unwanted event could occur is referred to as a(n) a) b) c) d) threat. exposure. risk. loss. 7. Accountants must try to protect the AIS from threats. Which of the following would be a measure that should be taken? a) b) c) d) take a proactive approach to eliminate threats detect threats that do occur correct and recover from threats that do occur All of the above are proper measures for the accountant to take. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 8. The plan of organization that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as a) b) c) d) a phenomenon. internal control. an AIS threat. a preventive control. 9. Safeguarding assets is one of the primary purposes of internal control. Which of the following is not one of the other primary purposes? a) b) c) d) providing accurate and reliable accounting records promoting operational efficiency ensuring that no fraud has occurred encouraging adherence to management policies 10. Internal control is often referred to as a(n) __________, because it permeates an organization's operating activities and is an integral part of basic management activities. a) b) c) d) event activity process system 11. Which of the following control classifications does not fit with the others listed below? a) b) c) d) preventative detective administrative corrective 12. Which of the following is accomplished by corrective controls? a) b) c) d) identify the cause of the problem correct the resulting errors modify the system to prevent future occurrences of the problem All of the above are accomplished by corrective controls. 13. Duplicate checking of calculations is an example of a __________ control, and adherence to appropriate procedures to resubmit rejected transactions is an example of a __________ control. a) b) c) d) corrective; detective detective; corrective preventive; corrective detective; preventive 14. There are different types of internal controls available to an organization. The type of controls that deters problems before they arise are called a) b) c) d) detective controls. corrective controls. exposure controls. preventive controls. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 15. Corrective controls remedy problems discovered with detective controls. What is not a corrective control procedure? a) b) c) d) identify the cause of a problem deter problems before they arise correct resulting errors or difficulties modify the system so that future problems are minimized or eliminated 16. __________ controls are designed to make sure an organization's control environment is stable and well managed. a) b) c) d) Application Detective General Preventive 17. __________ controls prevent, detect and correct transaction errors and fraud. a) b) c) d) Application Detective General Preventive 18. Which of the following federal laws incorporated the language of the AICPA about controls into a law applying to all registered companies? a) b) c) d) Foreign Corrupt Practices Act of 1977 The Securities Exchange Act of 1934 Federal Corruption Prevention Act of 1987 The Securities Act of 1933 19. The primary purpose of the Foreign Corrupt Practices Act of 1977 was a) b) c) d) to require corporations to maintain a good system of internal control. to prevent the bribery of foreign officials by American companies. to require the reporting of any material fraud by a business. All of the above are required by the act. 20. Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. a) b) c) d) Foreign Corrupt Practices Act of 1977 The Securities Exchange Act of 1934 The Sarbanes-Oxley Act of 2002 The Control Provision of 1998 21. Which of the following is not one of the important aspects of the Sarbanes-Oxley Act? a) b) c) d) The creation of the Public Company Accounting Oversight Board New rules for auditors and management New roles for audit committees New rules for information systems development Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 22. A ________________ helps employees act ethically by setting limits beyond which an employee must not pass. a) b) c) d) Boundary system Diagnostic control system Interactive control system Internal control system 23. A ________________ measures company progress by comparing actual performance to planned performance. a) b) c) d) Boundary system Diagnostic control system Interactive control system Internal control system 24. A ________________ helps top-level managers with high-level activities that demand frequent and regular attention. a) b) c) d) Boundary system Diagnostic control system Interactive control system Internal control system 25. This control framework addresses the issue of control from three vantage points: business objectives, information technology resources, and information technology processes. a) b) c) d) ISACF's control objectives for information and related technology COSO's internal control framework COSO's enterprise risk management framework None of the above 26. This control framework defines internal controls and provides guidance for evaluating and enhancing internal control systems. a) b) c) d) ISACF's control objectives for information and related technology COSO's internal control framework COSO's enterprise risk management framework None of the above 27. This control framework's intent includes helping the organization to provide reasonable assurance that objectives are achieved and problems are minimized, and to avoid adverse publicity and damage to the organization's reputation. a) b) c) d) ISACF's control objectives for information and related technology COSO's internal control framework COSO's enterprise risk management framework None of the above 28. The COSO control model has five crucial components. Which of the following is not one of them? a) control environment b) risk assessment Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) compliance with federal, state, or local laws d) monitoring 29. According to the ERM, these help the company address all applicable laws and regulations. a) b) c) d) Compliance objectives Operations objectives Reporting objectives Strategic objectives 30. According to the ERM, high level goals that are aligned with and support the company's mission are a) b) c) d) Compliance objectives Operations objectives Reporting objectives Strategic objectives 31. According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals. a) b) c) d) Compliance objectives Operations objectives Reporting objectives Strategic objectives 32. According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. a) b) c) d) Compliance objectives Operations objectives Reporting objectives Strategic objectives 33. Which of the following is not one of the eight interrelated risk and control components of COSO? a) b) c) d) Internal environment Monitoring Risk response Event assessment 34. Which of the following is not one of the reasons COSO developed the more comprehensive ERM framework? a) The internal control framework has too narrow a focus. b) Long-standing internal control systems often have controls that protect against items that are no longer risks. c) Risk should be evaluated first, before controls. d) The Sarbanes-Oxley Act of 2002 required it. 35. Which of the following would be considered a "red flag" for problems with management operating style if the question were answered "yes"? a) Does management take undue business risks to achieve its objectives? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) Does management attempt to manipulate performance measures such as net income? c) Does management pressure employees to achieve results regardless of the methods? d) All of the above statements would raise "red flags" if answered "yes." 36. The audit committee of the board of directors is composed of a) b) c) d) officers of the company. inside directors of the company. outside directors of the company. all of the above 37. The audit committee is responsible for a) b) c) d) overseeing the internal control structure. overseeing the financial reporting process. working with the internal and external auditors. All of the above are responsibilities. 38. Regarding the issue of internal control, the internal environment itself consists of many factors. An issue regarding a conflict of interest should be addressed as a component of which factor? a) b) c) d) organization structure commitment to integrity and ethical values the audit committee of the board of directors management's philosophy and operating style 39. The definition of the lines of authority and responsibility and the overall framework for planning, directing, and controlling is laid out by the a) b) c) d) control activities organizational structure budget framework internal environment 40. Personnel policies such as background checks, mandatory vacations, and rotation of duties tend to deter a) b) c) d) unintentional errors employee fraud or embezzlement fraud by outsiders payroll irregularities 41. The stock exchange or FASB is best described as external influences that directly affect an organization's a) b) c) d) hiring practices philosophy and operating style internal environment methods of assigning authority 42. The internal control model developed by COSO is comprised of five interrelated components. Among these components is the internal environment. Which attribute below is not part of the internal environment? a) the competence of an organization's people Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) the integrity of an organization's people c) monitoring activities within the organization itself d) the ethical values of an organization's people 43. The amount of risk a company is willing to accept in order to achieve its goals and objectives is a) b) c) d) Inherent risk Residual risk Risk appetite Risk assessment 44. The risk that remains after management implements internal controls is a) b) c) d) Inherent risk Residual risk Risk appetite Risk assessment 45. The risk that exists before management takes any steps to control the likelihood or impact of a risk is a) b) c) d) Inherent risk Residual risk Risk appetite Risk assessment 46. When undertaking risk assessment, the expected loss is calculated like this. a) b) c) d) Impact times expected loss Impact times likelihood Inherent risk times likelihood Residual risk times likelihood 47. Generally in a risk assessment process, the first step is to a) b) c) d) identify the threats that the company currently faces. estimate the risk probability of negative events occurring. estimate the exposure from negative events. identify controls to reduce all risk to zero. 48. The third component of COSO's internal control model is risk assessment. Part of risk assessment is to identify threats to companies. If a company does the right things in the wrong way, this is known as a) b) c) d) a strategic threat. an operating threat. a financial threat. an information threat. 49. Management can authorize employees to handle routine transactions without special approval. This is known as a) Authorization b) General authorization c) Special authorization Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) Specific authorization 50. Good internal control demands that no single employee be given too much responsibility. The segregation of duties is key to fulfilling this demand. Which two functions, when not performed by different employees, will cause a potential internal control problem due to the lack of separation of duties? a) b) c) d) digital signature, specific authorization custody, recording digital signature, general authorization custody, digital signature 51. Regarding project development and acquisition controls, this is developed to show all projects that must be completed to achieve long-range company goals. a) b) c) d) Performance evaluation Project development plan Steering committee Strategic master plan 52. Regarding project development and acquisition controls, a ________ is created to guide and oversee systems development and acquisition. a) b) c) d) Performance evaluation Project development plan Steering committee Strategic master plan 53. Regarding project development and acquisition controls, a ________ shows how a project will be completed, including tasks and who will perform them as well as a timeline and cost estimates. a) b) c) d) Performance evaluation Project development plan Steering committee Strategic master plan 54. The concept of independent checks in transaction processing is illustrated by all of the following except a) b) c) d) reconciliation of independently maintained records. extensive edit checking of input data. comparisons of actual quantities to recorded amounts. record counts of inputs and outputs. SHORT ANSWER 55. What are the three functions of internal controls? 56. What are the two categories of internal controls? 57. What is the difference between general and specific authorization? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 58. What was the primary objective of the Foreign Corrupt Practices Act? 59. What is COSO? 60. What are the major components of control as defined in the COSO internal control model report? 61. What is a weakness of the internal control concept of the separation of duties? 62. Classify the following controls as preventive, detective, or corrective: Periodic bank reconciliation. Separation of cash and accounting records. Maintaining backup copies of master and transaction files. Pre-numbering of sales invoices. Chart of accounts. Retina scan before entering a sensitive R & D facility. Resubmission of transactions for subsequent processing. Internal auditor rechecking the debits and credits on the payment voucher. Depositing all cash receipts intact. Qualified accounting personnel ESSAY 63. Provide three reasons why AIS threats are increasing. Briefly discuss each one. 64. Why was the Foreign Corrupt Practices Act of interest to accountants? 65. Discuss the internal (control) environment. 66. Why is management's philosophy and operating style considered to be the most important component of the control environment? 67. What are some of the ways to assign authority and responsibility within an organization? 68. Discuss the weaknesses in COSO's internal control framework that lead to the development of the Enterprise Risk Management framework. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1) B 2) C 3) B 4) A 5) B 6) C 7) D 8) B 9) C 10) C 11) C 12) D 13) B 14) D 15) B 16) C 17) A 18) A 19) B 20) C 21) D 22) A 23) B 24) C 25) A 26) B 27) C 28) C 29) A 30) D 31) B 32) C 33) D 34) D 35) D 36) C 37) D 38) B 39) B 40) B 41) C 42) C 43) C 44) B 45) A 46) B 47) A 48) B 49) A 50) B 51) B 52) D 53) C 54) B Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) B Preventive, detective, and corrective General and application Authorizations are often documented by signing, initializing, or entering an authorization code on a transaction document or record. Management may deem that certain transactions are of a routine nature and as such may authorize employees to handle such transactions without special approval. This is known as general authorization. Other transactions may be of such consequence that management grants specific authorization for them to occur. Usually management must approve of such transactions and oversee them to completion, requiring an additional signature required on checks exceeding a given dollar amount. Management should have written policies on both specific and general authorization for all type of transactions. The primary objective of the Foreign Corrupt Practices Act is to prevent the bribery of foreign officials by American companies. The COSO defines internal control as a process implemented by management, the board of directors, and those under their direction to provide reasonable assurance that control objectives are achieved regarding effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations. The major components of control are: the control environment; control activities; risk assessment; information and communication; monitoring of performance. When a system effectively incorporates a separation of duties, it should be difficult for any one employee to defeat the system and commit embezzlement. The problem with the separation of duties comes when two or more employees agree to defeat the system for their own dishonest ends. This problem is known as collusion. When two or more employees act together to defeat the internal controls of the system, they may likely succeed in their endeavor for a time. It is more difficult to detect such activity because the employees may have planned to "cover their tracks." This is why independent review of transaction activity by third parties is important to monitor that internal controls are in place and working as designed. Detective. Preventive. Corrective. Preventive. Preventive. Preventive. Corrective. Detective. Preventive. Preventive Students may provide a variety of acceptable reasons, such as: Client/server systems have proliferated and have enabled large numbers of employees to have access to the information. LANs and client/server systems distribute data to various users and are more difficult to control than centralized systems. EDI and e-commerce have enabled customers and suppliers to access each other's systems and data, making confidentiality a major concern. Organizations are not aggressively protecting their data for various reasons. Computer control problems are often underestimated and downplayed. Control implications of networked systems are not properly reasoned out. Top management does not grasp the effect of security of data and information on survival and profitability of the company. Internal controls become a casualty in cost cutting and productivity measures undertaken by the management. The act is important to accountants because it incorporates the language of the AICPA pronouncement on internal controls. The Act mandates that corporations should keep records that accurately and fairly reflect their transactions and assets in reasonable detail. The internal control system of these organizations should be able to provide reasonable assurance that: a) transactions are properly authorized and recorded; b) assets are safeguarded and protected from unauthorized access; and c) recorded asset values are periodically compared with actual assets and any differences are corrected. The act requires corporations to maintain good systems of internal accounting control. The control environment embraces both individuals and the environment in which they operate in an organization. Individual employees are "the engine" that drives the organization and form the foundation upon which everything in the organization rests. Among the many factors found in the control environment are: 1) a commitment to integrity and ethical values; 2) the philosophy and operating style of management; 3) organizational structure; 4) the audit committee of the board of directors; 5) methods of assigning authority and responsibility; 6) human resources policies and practices; and 7) various external influences. Each of these factors influences the internal control structure of the organization. Likewise, these factors should be examined and analyzed in detail when implementing or evaluating a system of internal controls. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 67) Management truly sets the tone for the control environment of a business. If top management takes good control seriously and makes this known to everyone in the organization, then employees down the line will tend to do likewise. Management's attitude toward risk taking and the assessment of risk before acting are indications. Willingness to manipulate performance measures or to encourage employees to do likewise is another indication of attitude. Finally, pressure on subordinates to achieve certain results regardless of the methods used can be a very persuasive indicator of problems. Management concerned about control will assess risk and act prudently, manipulation of performance measures will not be tolerated, and ethical behavior will be instilled in and required of employees. 68) It is incumbent on management to identify specific business objectives and assign such objectives to certain departments and individuals. Management must also hold such departments and individuals responsible and accountable for achieving the assigned business objectives. Ways in which management may assign authority and responsibility is through formal job descriptions, employee training, budgets, operating plans, and scheduling. A formal code of conduct also sets the stage for responsible behavior on the part of employees by defining ethical behavior, acceptable business practices, regulatory requirements, and conflicts of interest. Another useful and important tool is a written policy and procedures manual. 69) Weaknesses in COSO's internal control framework that lead to the development of the ERM model include: 1. It has too narrow a focus. 2. Examining controls without first addressing purposes and risks of business processes gives little context for evaluating results. 3. Existing internal control systems often have controls that protect against items that are no longer risks or are no longer important. 4. Focusing on controls first has an inherent bias toward past problems and concerns. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 7 MULTIPLE CHOICE 1. The AICPA and the CICA have created an evaluation service known as SysTrust. SysTrust follows four principles to determine if a system is reliable. The reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as a) b) c) d) availability. security. maintainability. integrity. 2. According to SysTrust, the reliability principle of integrity is achieved when a) the system is available for operation and use at times set forth by agreement. b) the system is protected against unauthorized physical and logical access. c) the system can be maintained as required without affecting system availability, security, and integrity. d) system processing is complete, accurate, timely, and authorized. 3. Which of the following is not one of the five basic principles that contribute to systems reliability according to the Trust Services framework. a) b) c) d) Confidentiality Processing speed Security System availability 4. Which of the following is the foundation of systems reliability? a) b) c) d) Confidentiality Privacy Processing Security 5. Which of the following is not one of the three fundamental information security concepts? a) b) c) d) Information security is a technology issue that hinges on prevention. Security is a management issue, not a technology issue. The idea of defense-in-depth employs multiple layers of controls. The time-based model of security focuses on the relationship between preventive, detective and corrective controls. 6. The trust services framework identifies four essential criteria for successfully implementing each of the principles that contribute to systems reliability. Which of the following is not one of those four essential criteria? a) b) c) d) Developing and documenting policies Effectively communicating policies to all outsiders Designing and employing appropriate control procedures to implement policies Monitoring the system and taking corrective action to maintain compliance with policies 7. Giving users regular, periodic reminders about security policies and training in complying with them is an example of which of the following trust services criteria? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) Policy development Effective communication of policies Design/use of control procedures Monitoring and remedial action 8. Because planning is more effective than reacting, this is an important criteria for successfully implementing systems reliability: a) b) c) d) Policy development Effective communication of policies Design/use of control procedures Monitoring and remedial action 9. If the time an attacker takes to break through the organization's preventive controls is greater than the sum of the time required to detect the attack and the time required to respond to the attack, then security is a) b) c) d) effective ineffective overdone undermanaged 10. Preventive controls require two related functions, which are: a) b) c) d) Access and control Authentication and authorization Detection and correction Physical access and logical access 11. Verifying the identity of the person or device attempting to access the system is a) b) c) d) Authentication Authorization Identification Threat monitoring 12. Restricting access of users to specific portions of the system as well as specific tasks, is a) b) c) d) Authentication Authorization Identification Threat monitoring 13. Which of the following is an example of a preventive control? a) b) c) d) Encryption Log analysis Intrusion detection Emergency response teams 14. Which of the following is an example of a detective control? a) b) c) d) Physical access controls Encryption Log analysis Emergency response teams Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 15. Which of the following is an example of a corrective control? a) b) c) d) Physical access controls Encryption Intrusion detection Emergency response teams 16. Which of the following is not a requirement of effective passwords? a) b) c) d) Passwords should be changed at regular intervals. Passwords should be no more than 8 characters in length. Passwords should contain a mixture of upper and lowercase letters, numbers and characters. Passwords should not be words found in dictionaries. 17. Which of the following is not a requirement of effective passwords? a) b) c) d) Passwords should be changed at regular intervals. Passwords should be no more than 8 characters in length. Passwords should contain a mixture of upper and lowercase letters, numbers and characters. Passwords should not be words found in dictionaries. 18. Multi-factor authentication a) b) c) d) Involves the use of two or more basic authentication methods. Is a table specifying which portions of the systems users are permitted to access. Provides weaker authentication than the use of effective passwords. Requires the use of more than one effective password. 19. An access control matrix a) b) c) d) Does not have to be updated. Is a table specifying which portions of the system users are permitted to access. Is used to implement authentication controls. Matches the user's authentication credentials to his authorization. 20. Perimeter defense is an example of which of the following preventive controls that are necessary to provide adequate security. a) b) c) d) Training Controlling physical access Controlling remote access Host and application hardening 21. Which of the following preventive controls are necessary to provide adequate security that deals with social engineering? a) b) c) d) Controlling remote access Encryption Host and application hardening Training 22. The device that connects an organization's information system to the Internet is a a) b) c) d) Demilitarized zone Firewall Gateway Router Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 23. A special purpose hardware device or software running on a general purpose computer which filters information allowed to enter and leave the organization's information system. a) b) c) d) Demilitarized zone Intrusion detection system Intrusion prevention system Firewall 24. This protocol specifies the procedures for dividing files and documents into packets to be sent over the Internet. a) b) c) d) Access control list Internet protocol Packet switching protocol Transmission control protocol 25. This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination. a) b) c) d) Access control list Internet protocol Packet switching protocol Transmission control protocol 26. This determines which packets are allowed entry and which are dropped.. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 27. Compatibility tests utilize a(n) __________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. a) b) c) d) validity test biometric matrix logical control matrix access control matrix 28. This screens individual IP packets based solely on the contents of the source or destination fields in the packet header.. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 29. This maintains a table that lists all established connections between the organization's computers and the Internet to determine whether an incoming packet is part of an ongoing communication initiated by an internal computer.. a) Access control list b) Deep packet inspection c) Stateful packet filtering Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) Static packet filtering 30. This processes involves the firewall examining the data in the body of an IP packet. a) b) c) d) Access control list Deep packet inspection Stateful packet filtering Static packet filtering 31. This is designed to identify and drop packets that are part of an attack. a) b) c) d) Deep packet inspection Intrusion detection system Stateful packet filtering Static packet filtering 32. This is used to identify rogue modems (or by hackers to identify targets). a) b) c) d) War chalking War dialing War driving None of the above 33. The process of turning off unnecessary features in the system is known as a) b) c) d) Deep packet inspection Hardening Intrusion detection War dialing 34. The most common input-related vulnerability is a) b) c) d) Buffer overflow attack Hardening War dialing Encryption 35. The final layer of preventive controls. a) b) c) d) Authentication Authorization Encryption Intrusion detection 36. The process of transforming normal text into cipher text a) b) c) d) Encryption Decryption Filtering Hardening 37. Which of the following is not one of the three important factors determining the strength of any encryption system? a) Key length b) Key management policies c) Encryption algorithm Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) Privacy 38. Which of the following is not one of the three important factors determining the strength of any encryption system? a) b) c) d) Key length Key management policies Encryption algorithm Privacy 39. These systems use the same key to encrypt and to decrypt. a) b) c) d) Asymmetric encryption Hashing encryption Public key encryption Symmetric encryption 40. Which of the following descriptions is not associated with symmetric encryption? a) b) c) d) A shared secret key Faster encryption Lack of authentication Separate keys for each communication party. 41. Which of the following is not associated with asymmetric encryption? a) b) c) d) No need for key exchange Public keys Private keys Speed 42. A process that takes plaintext of any length and transforms it into a short code. a) b) c) d) Asymmetric encryption Encryption Hashing Symmetric encryption 43. These are used to create digital signatures. a) b) c) d) Asymmetric encryption and hashing Hashing and packet filtering Packet filtering and encryption Symmetric encryption and hashing 44. Information encrypted with the creator's private key that is used to authenticate the sender is. a) b) c) d) Asymmetric encryption Digital certificate Digital signature Public key 45. An electronic document that certifies the identity of the owner of a particular public key. a) Asymmetric encryption b) Digital certificate Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) Digital signature d) Public key 46. The system and processes used to issue and manage asymmetric keys and digital certificates. a) b) c) d) Asymmetric encryption Certificate authority Digital signature Public key infrastructure 47. The system and processes used to issue and manage asymmetric keys and digital certificates. a) b) c) d) Asymmetric encryption Certificate authority Digital signature Public key infrastructure 48. In a private key system the sender and the receiver have __________, and in the public key system they have __________. a) b) c) d) different keys; the same key a decrypting algorithm; an encrypting algorithm the same key; two separate keys an encrypting algorithm; a decrypting algorithm 49. One way to circumvent the counterfeiting of public keys is by using a) b) c) d) a digital certificate. digital authority. encryption. cryptography. 50. Which of the following describes one weakness of encryption? a) b) c) d) Encrypted packets cannot be examined by a firewall. Encryption protects the confidentiality of information while in storage. Encryption protects the privacy of information during transmission. Encryption provides for both authentication and non-repudiation. 51. This creates logs of network traffic that was permitted to pass the firewall a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 52. This uses automated tools to identify whether a given system possesses any wellknown security problems. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 53. This is an authorized attempt by an internal audit team or an external security consultant to break into the organization's information system. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 54. A more rigorous test of the effectiveness of an organization's computer security. a) b) c) d) Intrusion detection system Log analysis Penetration test Vulnerability scan 55. These are established to deal with major security breaches. a) b) c) d) CERTs CSOs FIRSTs Intrusion detection systems 56. The ___________ disseminates information about fraud, errors, breaches and other improper system uses and their consequences. a) b) c) d) Chief information officer Chief operations officer Chief security officer Computer emergency response team SHORT ANSWER 57. Identify the five basic principles that contribute to systems reliability according to the Trust Services framework developed by the AICPA and the CICA. 58. What are the three fundamental information security concepts? 59. What are three ways users can be authenticated? 60. What three factors determine the strength of any encryption system? 61. How does an intrusion detection system work? 62. What is a penetration test? ESSAY 63. Describe four requirements of effective passwords 64. Explain social engineering. 65. What are the problems with symmetric encryption? 66. Explain the value of penetration testing. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1) A 2) D 3) B 4) D 5) A 6) B 7) B 8) A 9) B 10) B 11) A 12) B 13) A 14) C 15) D 16) B 17) B 18) A 19) B 20) C 21) D 22) D 23) D 24) D 25) B 26) A 27) D 28) D 29) C 30) B 31) B 32) B 33) B 34) A 35) C 36) A 37) D 38) D 39) D 40) C 41) D 42) C 43) A 44) C 45) B 46) D 47) D 48) C 49) A 50) A 51) A 52) D 53) C 54) C Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) 66) C C Security, confidentiality, privacy, processing integrity, availability. 1. Security is a management issue, not a technology issue. 2. The time-based model of security. 3. Defense-in-depth. Users can be authenticated by verifying: 1. something they know (password). 2. something they have (smart card or ID badge). 3. Something they are (biometric identification of fingerprint). 1. Key length. 2. Key management policies. 3. Encryption algorithm. An intrusion detection system creates logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions. An authorized attempt by either an internal audit team or an external security consultant to break into the organization's information system. 1. Strong passwords should be at least 8 characters. 2. Passwords should use a mixture of upper and lowercase letters, numbers and characters. 3. Passwords should be random and not words found in dictionaries. 4. Passwords should be changes frequently. Social engineering attacks use deception to obtain unauthorized access to information resources, such as attackers who post as a janitor or as a legitimate system user. Employees must be trained not to divulge passwords or other information about their accounts to anyone who contacts them and claims to be part of the organization's security team. Symmetric encryption is much faster than asymmetric encryption, but it has several problems. 1. Both parties (sender and receiver) need to know the shared secret key. 2. Separate secret keys must be maintained for use with each different communication party. 3. There is no way to prove who created a specific document. Penetration testing involves an authorized attempt by an internal audit team or an external security consultant to break into the organization's information system. This type of service is provided by risk management specialists in all the Big Four accounting firms. These specialists spend more than half of their time on security matters. The team attempts to compromise the system using every means possible. With a combination of systems technology skills and social engineering, these teams often find weaknesses in systems that were believed to be secure. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 8 MULTIPLE CHOICE 1. Concerning virtual private networks (VPN), which of the following is not true? a) VPNs provide the functionality of a privately owned network using the Internet. b) Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys. c) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned secure communications network. d) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network. 2. The goal of information systems controls is a) b) c) d) To ensure that systems objectives are met. To ensure that systems function To ensure that systems are reliable. To ensure that data are confidential. 3. Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? a) b) c) d) Choice and consent. Disclosure to third parties. Reimbursement. Use and retention. 4. Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information? a) b) c) d) Access. Monitoring and enforcement. Registration. Security. 5. A text file created by a website and stored on a visitor's hard disk. a) b) c) d) Validity check Spam Error log Cookie 6. Forms design is an example of this type of control. a) b) c) d) Data entry controls Data transmission controls Output controls Source data controls 7. Sequentially pre-numbered forms is an example of . a) Data entry controls b) Data transmission controls c) Processing controls Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) Source data controls 8. Message acknowledgement techniques are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Processing controls 9. File labels are an example of a) b) c) d) Data entry controls Output controls Processing controls Source data controls 10. Turnaround documents are an example of a) b) c) d) Data entry controls Output controls Processing controls Source data controls 11. Input validation checks are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Source data controls 12. Parity checks are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Processing controls 13. Error logs and review are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Processing controls 14. Visual scanning is an example of a) b) c) d) Data entry controls Output controls Processing controls Source data controls 15. User reviews are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Processing controls Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 16. Data matching is an example of a) b) c) d) Data entry controls Data transmission controls Processing controls Source data controls 17. Batch totals are an example of a) b) c) d) Data entry controls Data transmission controls Output controls Processing controls 18. Check digit verification is an example of a) b) c) d) Data transmission controls Output controls Processing controls Source data controls 19. Data conversion checks are an example of a) b) c) d) Data entry controls Output controls Processing controls Source data controls 20. This determines if the characters in a field are of the proper type. a) b) c) d) Field check Limit check Range check Reasonableness test 21. This ensures that the input data will fit into the assigned field. a) b) c) d) Limit check Range check Size check Validity check 22. This tests a numerical amount to ensure that it does not exceed a predetermined value. a) b) c) d) Completeness check Limit check Range check Sign check 23. This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value. a) b) c) d) Completeness check Field check Limit check Range check Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 24. This determines if all required data items have been entered. a) b) c) d) Completeness check Field check Limit check Range check 25. This compares the ID number in transaction data with similar data in the master file to verify that the account exists. a) b) c) d) Reasonableness test Sign check Size check Validity check 26. This determines the correctness of the logical relationship between two data items. a) b) c) d) Range check Reasonableness test Sign check Size check 27. This batch processing data entry control tests if a batch of input data is in the proper numerical or alphabetical sequence. a) b) c) d) Batch total Financial total Hash total Sequence check 28. This batch processing data entry control sums a field that contains dollar values. a) b) c) d) Batch total Financial total Hash total Sequence check 29. This batch processing data entry control sums a non-financial numeric field. a) b) c) d) Batch total Financial total Hash total Sequence check 30. This batch processing data entry control sums the number of items in a batch. a) b) c) d) Batch total Hash total Record count Sequence check 31. This ensures that the correct and most current files are being updated. a) b) c) d) Cross-footing balance test Data matching File labels Write-protect mechanism Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 32. These find processing errors. a) b) c) d) Cross-footing balance test File labels Recalculation of batch totals Write-protect mechanisms 33. This compares the results produced by more than one method to verify accuracy. a) b) c) d) Concurrent update control Cross-footing balance test Data matching Recalculation of batch totals 34. This protects records from errors that occur when two or more users attempt to update the same record simultaneously. a) b) c) d) Concurrent update controls Cross-footing balance test Data conversion controls Recalculation of batch totals 35. The system and the receiving unit calculate a summary statistic and compare it. a) b) c) d) Echo check Numbered batches Parity check Trailer record 36. This entails verifying that the proper number of bit sare set to the value 1 in each character received. a) b) c) d) Echo check Numbered batches Parity check Trailer record 37. This entails verifying that the proper number of bits are set to the value 1 in each character received. a) b) c) d) Echo check Numbered batches Parity check Trailer record 38. Concerning availability, which of the following statements is true? a) b) c) d) Human error does not threaten system availability. Proper controls can maximize the risk of threats causing significant system downtime. Threats to system availability can be completely eliminated. Threats to system availability include hardware and software failures as well as natural and manmade disasters. 39. This enables a system to continue functioning in the even that a particular component fails, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) Backup procedures Fault tolerance Preventive maintenance None of the above 40. This enables a system to continue functioning in the even that a particular component fails, a) b) c) d) Backup procedures Fault tolerance Preventive maintenance None of the above 41. Every organization should have a disaster recovery plan so that data processing capacity can be restored as smoothly and quickly as possible. Which item below would not typically be part of an adequate disaster recovery plan? a) b) c) d) a system upgrade due to operating system software changes uninterruptible power systems installed for key system components scheduled electronic vaulting of files backup computer and telecommunication facilities 42. ________ involves copying only the data items that have changed since the last backup. a) b) c) d) Archive Backup Differential backup Incremental backup 43. ________ copies all changes made since the last full backup. a) b) c) d) Archive Backup Differential backup Incremental backup 44. While this type of backup takes longer, it's restoration is simpler. a) b) c) d) Archive Backup Differential backup Incremental backup 45. A copy of a database, master file, or software that will be retained indefinitely as a historical record. a) b) c) d) Archive Backup Differential backup Incremental backup 46. A location that is pre-wired for necessary telecommunications and computer equipment. a) a cold site b) a hot site Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) a remote sister site d) a subsidiary location 47. A facility that contains all the computing equipment the organization needs to perform its essential business activities. a) b) c) d) a cold site a hot site a remote sister site a subsidiary location 48. Which of the following is not the objective of a disaster recovery plan? a) b) c) d) Minimize the extent of the disruption, damage or loss. Permanently establish an alternative means of processing information. Resume normal operations as soon as possible. Train employees for emergency operations. 49. The most important change management technique is probably a) b) c) d) User rights and privileges are carefully monitored during change process. Changes tested thoroughly prior to implementation. All documentation is updated to reflect changes to the system. Adequate monitoring and review by top management. 50. Which of the following is not a useful control procedure to control access to system outputs? a) b) c) d) Allowing visitors to move through the building without supervision. Coding reports to reflect their importance. Requiring employees to log out of applications when leaving their desk. Restricting access to rooms with printers. SHORT ANSWER 51. Identify a fundamental control procedure for protecting that confidentiality of sensitive information. 52. Identify four source data controls. 53. Identify four data entry controls. 54. Identify four processing controls. 55. Identify four data transmission controls. 56. Identify two output controls. 57. What is fault tolerance? ESSAY 58. Identify four useful procedures for controlling access to system outputs. 59. Identify the 10 internationally recognized best practices for protecting the privacy of customers' personal information. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 60. Describe some steps you can take to minimize your risk of identify theft. ANSWER KEY 1) D 2) C 3) C 4) C 5) D 6) D 7) D 8) B 9) C 10) D 11) A 12) B 13) A 14) D 15) C 16) C 17) D 18) D 19) C 20) A 21) C 22) B 23) D 24) A 25) D 26) B 27) D 28) B 29) C 30) C 31) C 32) C 33) B 34) A 35) A 36) C 37) C 38) D 39) B 40) B 41) A 42) D 43) C 44) C 45) A 46) A 47) B 48) B 49) D 50) A 51) Encryption 52) Answers include: forms design, pre-numbered forms sequence test, turnaround documents, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 53) 54) 55) 56) 57) 58) 59) 60) cancellation and storage of documents, authorization and segregation of duties, visual scanning, check digit verification, RFID security. Answers include: field check, sign check, limit check, range check, size check, completeness check, validity check, reasonableness check, prompting, pre-formatting, closed-loop verification, transaction log. Answers include: data matching, file labels, recalculation of batch totals, cross-footing balance test, write-protection mechanisms, database processing integrity procedures, concurrent update controls, data conversion controls. Answers include: parity checking, echo check, trailer record, numbered batches. Answers include: user review of output, reconciliation procedures, external data reconciliation. Fault tolerance is the use of redundant components that enable a system to continue functioning in the event that a particular component fails. Not allowing visitors to move through the building without supervision. Coding reports to reflect their importance. Requiring employees to log out of applications when leaving their desk. Restricting access to rooms with printers. Management. Notice. Choice and consent. Collection. Use and retention. Access. Disclosure to third parties. Security. Quality. Monitoring and enforcement. Shred documents containing personal information. Never send personally identifying information in unencrypted email. Beware of email/phone/print requests to verify personal information that the requesting party should already possess. Do not carry your social security card with you. Print only your initials and last name on checks. Limit the amount of other information preprinted on checks. Do not use your mailbox for outgoing mail. Do not carry more than a few blank checks with you. Use special software to digitally clean any digital media prior to disposal. Monitor your credit cards regularly. File a police report as soon as you discover a purse or wallet missing. Make photocopies of driver's license, passports and credit cards and keep in a safe location. Immediately cancel any stolen or lost credit cards. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 9 MULTIPLE CHOICE 1. The American Accounting Association has formulated a general definition of auditing. What is not a characteristic of this general definition? a) Auditing is a systematic process. b) Auditors are responsible for objectively obtaining and evaluating evidence regarding assertions about economic actions and events. c) Auditors are responsible for financial management and the investment of corporate assets. d) Auditors are responsible for communicating the results of audits to interested users. 2. Which characteristics below is not a characteristic of auditing? a) b) c) d) evidence collection establishing audit criteria objectivity systems development 3. Auditing involves the a) b) c) d) collection, review, and documentation of audit evidence. planning and verification of economic events. collection of audit evidence and approval of economic events. testing, documentation, and certification of audit evidence. 4. The purpose of an internal audit is a) b) c) d) to evaluate the adequacy and effectiveness of company's internal controls. to determine the extent to which assigned responsibilities are actually carried out. to collect evidence on whether the company is continuing as a going concern. A and B only 5. The type of audit in which the primary responsibility of the auditors is the management of the organization is a) b) c) d) an external audit. a governmental audit. an internal audit. a public audits. 6. What is not a typical responsibility of an internal auditor? a) b) c) d) helping management to improve organizational effectiveness assisting in the design and implementation of an AIS preparation of the company's financial statements implementing and monitoring of internal controls 7. The Institute of Internal Auditors (IIA) has established five audit scope standards that outline the internal auditor's responsibilities. Which standard below deals with the principles of reliability and integrity? a) determining whether the systems are designed to comply with operating and reporting policies b) review of how assets are safeguarded and verification of their existence as appropriate c) review of company operations and programs to determine whether they are being carried out as planned d) review of operating and financial information and how it is identified, measured, classified, and Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 reported 8. The three different types of audits commonly performed today are a) b) c) d) internal, external, defense contracting. financial, operational, information systems. financial, operational, management. internal, external, public. 9. There are different types of internal audit work. Which type of work listed below is not typical of internal auditors? a) b) c) d) operational and management audits information system audits financial statement audit financial audit of accounting records 10. The __________ audit examines the reliability and integrity of accounting records. a) b) c) d) financial informational information systems operational 11. The __________ audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets. a) b) c) d) financial information systems management internal control 12. One type of audit that is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives corresponds to the fourth and fifth standards set forth by the IIA. This is known as a(n) __________ audit. a) b) c) d) financial information systems internal control operational or management 13. The __________ audit is concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. a) b) c) d) financial informational information systems operational 14. The purpose of __________ is to determine why, how, when, and who will perform the audit. a) b) c) d) audit planning the collection of audit evidence the communication of audit results the evaluation of audit evidence Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 15. Practically all audits follow a similar sequence of activities that can be divided into four stages. Organizing the audit team and the physical examination of assets are components of which two separate audit stages? a) b) c) d) audit planning; evaluation of audit evidence audit planning; collection of audit evidence collection of audit evidence; communication of audit results audit planning only 16. With which stage in the auditing process are the consideration of risk factors and materiality most associated? a) b) c) d) audit planning collection of audit evidence communication of audit results evaluation of audit evidence 17. A system that employs various types of advanced technology has more __________ risk than traditional batch processing. a) b) c) d) control detection inherent investing 18. An audit should be planned so that the greatest amount of audit work focuses on the areas with the highest risk factors. Regarding risk factors, control risk is defined as a) the susceptibility to material risk in the absence of controls. b) the risk that a material misstatement will get through the internal control structure and into the financial statements. c) the risk that auditors and their audit procedures will not detect a material error or misstatement. d) the risk auditors will not be given the appropriate documents and records by management who wants to control audit activities and procedures. 19. The possibility that a material error will occur even though auditors are following audit procedures and using good judgment is referred to as a) b) c) d) control risk. detection risk. inherent risk. investigating risk. 20. The __________ part of the auditing process involves (among other things) the auditors observing the operating activities and having discussion with employees. a) b) c) d) audit planning collection of audit evidence communication of audit results evaluation of audit evidence 21. The evidence collection method that is used to gather data about the system is a) reperformance. b) questionnaires. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) valuation. d) none of the above 22. Much of the effort spent in an audit entails the collection of evidence. Verifying the accuracy of certain information, often through communication with certain third parties, is known in the language of the auditor as a) b) c) d) reperformance. confirmation. substantiation. documentation. 23. The evidence collection method that examines all supporting documents to determine the validity of a transaction is called a) b) c) d) review of documentation. vouching. physical examination. analytical review. 24. The evidence collection method that considers the relationship and trends among information to detect items that should be investigated further is called a) b) c) d) review of the documentation. vouching. physical examination. analytical review. 25. Assessing the quality of internal controls, the reliability of information, and operating performance are all part of which stage of the auditing process? a) b) c) d) audit planning collection of audit evidence evaluation of audit evidence communication of audit results 26. One way an auditor gauges how much audit work and testing needs to be performed is through evaluating materiality and seeking reasonable assurance about the nature of the information or process. What is key to determining materiality during an audit? a) determining if material errors exist in the information or processes undergoing audit b) the testing of records, account balances, and procedures on a sample basis c) determining what is and is not important given a set of circumstances is primarily a matter of judgment d) none of the above 27. An auditor must be willing to accept some degree of risk that the audit conclusion is incorrect. Accordingly, the auditor's objective is to seek __________ that no material error exists in the information audited. a) b) c) d) absolute reliability reasonable evidence reasonable assurance reasonable objectivity 28. During all stages of the audit, findings and conclusions are documented in Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) audit trails. audit working papers. audit reports. audit objectives. 29. The risk-based audit approach is a) b) c) d) a four-step approach to internal control evaluation. a four-step approach to financial statement review and recommendations. a three-step approach to internal control evaluation. a three-step approach to financial statement review and recommendations. 30. Which of the following is the first step in the risk-based audit approach? a) b) c) d) identify the control procedures that should be in place evaluate the control procedures determine the threats facing the AIS evaluate weaknesses to determine their effect on the audit procedures 31. Determining whether the necessary control procedures are in place is accomplished by conducting a) b) c) d) a systems overhaul. a systems review. tests of controls. none of the above 32. Using the risk-based auditing approach, when the auditor identifies a control deficiency, the auditor should inquire about a) b) c) d) tests of controls. the feasibility of a systems review. materiality and inherent risk factors. compensating controls. 33. The __________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures. a) b) c) d) risk-based approach risk-adjusted approach financial audit approach information systems approach 34. What is the purpose of an AIS audit? a) b) c) d) to determine the inherent risk factors found in the system to review and evaluate the internal controls that protects the system to examine the reliability and integrity of accounting records to examine whether resources have been used in an economical and efficient manner in keeping with organization goals and objectives 35. There are six objectives of an AIS audit. The objective that pertains to source data being processed into some form of output is a) Objective 1: overall security. b) Objective 2: program development. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) Objective 3: program modifications. d) Objective 4: processing. 36. To maintain the objectivity necessary for performing an independent evaluation function, auditors should not be involved in a) b) c) d) making recommendations to management for improvement of existing internal controls. examining system access logs. examining logical access policies and procedures. developing the system. 37. The auditor's role in systems development should be a) b) c) d) an advisor and developer of internal control specifications. a developer of internal controls. that of an independent reviewer only. A and B above 38. Regarding program modifications, which statement below is incorrect? a) Only material program changes should be thoroughly tested and documented. b) When a program change is submitted for approval, a list of all required updates should be compiled and then approved by management and program users. c) During the change process, the developmental version of the program must be kept separate from the production version. d) After the amended program has received final approval, the change is implemented by replacing the production version with the developmental version. 39. How would auditors determine if unauthorized program changes have been made? a) b) c) d) by interviewing and making inquiries of the programming staff by examining the systems design and programming documentation by using a source code comparison program by interviewing and making inquiries of recently terminated programming staff 40. Which auditing technique will not assist in determining if unauthorized programming changes have been made? a) b) c) d) use of a source code comparison program use of the reprocessing technique to compare program output interviewing and making inquiries of the programming staff use of parallel simulation to compare program output 41. Strong __________ controls sometimes can compensate for inadequate __________ controls. a) b) c) d) development; processing processing; development operational; internal internal; operational 42. The __________ procedure for auditing computer process controls uses a hypothetical series of valid and invalid transactions. a) concurrent audit techniques b) test data processing Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) integrated test facility d) dual process 43. The auditor uses __________ to continuously monitor the system and collect audit evidence while live data are processed. a) b) c) d) test data processing parallel simulation concurrent audit techniques analysis of program logic 44. Auditors have several techniques available to them to test computer-processing controls. An audit routine that flags suspicious transactions is known as a) b) c) d) SCARF. an audit hook. an audit sinker. the snapshot technique. 45. When it is suspected that a particular application program contains unauthorized code or serious errors, a detailed analysis of the program logic may be necessary. The auditor has several types of software packages available to help in analyzing program logic. A program which identifies unexecuted program code is a) b) c) d) a mapping program. an audit log. a scanning routine. program tracing. 46. One way to document the review of source data controls is to use a) b) c) d) a flowchart generator program. a mapping program. an input control matrix. a program algorithm matrix. 47. To document the review of source data controls, an auditor may use a) b) c) d) an input control matrix. test data processing. computer audit software. analysis of program logic. 48. The auditor has various software programs available to help in the audit effort. A program that, based on auditor specifications, generates programs that perform certain audit functions is referred to a(n) a) b) c) d) input controls matrix. CAS. VAN. mapping program. 49. The use of a secure file library and restrictions on physical access to data files is a control procedure used in conjunction with Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) computer processing controls. data files. program modification procedures. program development. 50. When the auditor wants to read data in different formats and convert it into a single common format, the __________ function of a generalized audit software package is used. a) b) c) d) data selection reformatting file processing statistics 51. One function of CAS is to review data files to retrieve records meeting a specified criteria. What is this function called? a) b) c) d) reformatting file processing data analysis data selection 52. What is the primary purpose of computer audit software? a) b) c) d) to free the auditor from the attest phase of the audit to assist the auditor in reviewing and retrieving information in computer files to look for unauthorized modifications and changes to system program code to assist the auditor in reviewing and retrieving information in accounting records and systems documentation 53. The scope of a(n) __________ audit encompasses all aspects of information systems management. a) b) c) d) operational information systems financial internal control 54. Evaluating effectiveness, efficiency, and goal achievement are objectives of __________ audits. a) b) c) d) financial operational information systems all of the above 55. In the __________ stage of an operational audit, the auditor measures the actual system against an ideal standard. a) b) c) d) evidence collection evidence evaluation testing internal control Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 SHORT ANSWER 56. Name the different types of audits. 57. Name the four major stages of all audits. 58. List and explain the types of risk possible when conducting an audit. 59. Explain why the auditor's role in program development and acquisition should be limited. 60. How and to whom does an auditor communicate the audit results? 61. Why are audit tests and procedures performed on a sample basis? 62. When doing an information systems audit, auditors must review and evaluate the program development process. What two things could go wrong during the program development process? 63. Briefly describe tests that can be used to detect unauthorized program modifications. 64. What does an auditor examine when performing a detailed analysis of program logic? 65. What are embedded audit modules? 66. What is computer audit software or generalized audit software? 67. How is a financial audit different from an information systems audit? 68. Why do all audits follow a sequence of events that can be divided into four stages? 69. What are the types of evidence-gathering activities generally used in an operational audit? ESSAY 70. Name and briefly describe the different types of audits. 71. List and explain the types of risk possible when conducting an audit. 72. What is the risk-based audit approach? 73. a) What is test data processing? b) How is it done? c) What are the sources that an auditor can use to generate test data? 74. Discuss the disadvantages of test data processing. 75. Discuss the collection of evidence in audits. ANSWER KEY 1) c 2) d 3) a 4) d 5) c 6) c 7) d 8) b 9) c 10) a Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) 55) 56) 57) 58) 59) b d d a b a c b b b b b b d c c c b a c b d a b d d c a c c b b c b a c a b b b d b a b b The financial audit. information systems audit. operational or management audit. audit planning. collection of evidence. evaluation of evidence. communication of results . Inherent risk. Control risk. Detection risk. The auditor's role in any organization systems development should be limited only to an independent review of systems development activities. The key to the auditor's role is independence; the only way auditors can maintain the objectivity necessary for performing an independent evaluation function is by avoiding any and all involvement in the development of the system itself. If auditor independence is impaired, the audit itself may be of little value and its results could easily be called into question. 60) The auditor usually prepares a written (or sometimes oral) report summarizing the findings and recommendations with references to supporting evidence in working papers. The report is Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 61) 62) 63) 64) 65) 66) 67) 68) 69) 70) 71) 72) presented to management, the audit committee, the board of directors, and other appropriate parties. It is not feasible (in terms of time or costs) to perform tests and procedures on the entire set of activities, records, assets, or documents under review. Using statistical sampling, reliable numeric samples can be computed and taken which will give the auditor a good degree of reliability as to the entire set of activities, records, assets, or documents under review. There can be unintentional errors due to misunderstood systems specifications, incomplete specifications, or poor programming. Developers could insert unauthorized code instructions into the program for fraudulent purposes. Source code comparison - use of a computer program to compare the auditor's copy of the source code with the program code currently in use. - on a random basis, the auditor uses a copy of source code to reprocess company data and compares the results with that obtained with the program currently in use. simulation - similar to reprocessing but auditor writes a program instead of using the source code An auditor refers to systems and program flowcharts, program documentation, and a listing or program source code. Embedded audit modules are segments of applications program code that perform audit functions. Computer audit software or generalized audit software are computer programs written for auditors that generate programs to perform audit functions based on the auditor's specifications. Financial audits examine the reliability and integrity of accounting records in terms of financial and operating information. An information systems (IS) audit reviews the general and application controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets. Although the AIS may generate accounting records and financial information, it is important that the AIS itself be audited to verify compliance with internal controls and procedures. The auditor's function generally remains the same no matter what type of audit is being conducted. The process of auditing can be broken down into the four stages of planning, collecting evidence, evaluating evidence, and communicating audit results. These stages form a working template for any type of financial, information systems, or operational or management audits. There are six general categories of evidence gathering activities in an operational audit. These activities include reviewing operating policies and documentation, confirming procedures with management and operating personnel, observing operating functions and activities, examining financial and operating plans and reports, testing the accuracy of operating controls, and testing controls. The financial audit - this audit examines the reliability and integrity of accounting records (both financial and operating information). The information systems audit - this audit reviews the general and application controls of an AIS and assesses its compliance with internal control policies and procedures and effectiveness in safeguarding assets. The operational or management audit - this audit conducts an evaluation of the efficient and effective use of resources, as well as an evaluation of the accomplishment of established goals and objectives. Inherent risk - the susceptibility to material risk in absence of controls. Control risk - the risk that a material misstatement will get through the internal control structure and into the financial statements. Detection risk - the risk that auditors and their audit procedures will not detect a material error or misstatement The risk-based audit approach has four steps that evaluate internal controls. This approach provides a logical framework for conducting an audit of the internal control structure of a system. The first step is to determine the threats facing the AIS. Threats here can be defined as errors and irregularities in the AIS. Once the threat risk has been established, the auditor should identify the control procedures that should be in place to minimize each threat. The control procedures identified should either be able to prevent or detect errors and irregularities within the AIS. The next step is to evaluate the control procedures. This step includes a systems review of documentation and also interviewing the appropriate personnel to determine whether the needed procedures are in place within the system. The auditor can then use tests of controls to determine if the procedures are being satisfactorily followed. The fourth step is to evaluate weaknesses found in the AIS. Weaknesses here means errors and irregularities not covered by the AIS control procedures. When such deficiencies are identified, the auditor should see if there are Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 compensating controls that may counterbalance the deficiency. A deficiency in one area may be neutralized given control strengths in other areas. The ultimate goal of the risk-based approach is to provide the auditor with a clear understanding of errors and irregularities that may be in the system along with the related risks and exposures. Once an understanding has been obtained, the auditor may provide recommendations to management as to how the AIS control system can be improved. 73) a) Test data processing is a technique used to examine the integrity of the computer processing controls. b) Test data processing involves the creation of a series of hypothetical valid and invalid transactions and the introduction of those transactions into the system. The invalid data may include records with missing data, fields containing unreasonably large amounts, invalid account numbers, etc. If the program controls are working, then all invalid transactions should be rejected. Valid transactions should all be properly processed. c) The various ways test data can be generated are: A listing of actual transactions. The initial transactions used by the programmer to test the system. A test data generator program that generates data using program specifications 74) The auditor must spend considerable time developing an understanding of the system and preparing an adequate set of test transactions. Care must be taken to ensure that test data does not affect the company's files and databases. The auditor can reverse the effects of the test transactions or process the transactions in a separate run using a copy of the file or database. However, a separate run removes some of the authenticity obtained from processing test data with regular transactions. Also, since the reversal procedures may reveal the existence and nature of the auditor's test to key personnel, it can be less effective than a concealed test. 75) Since the audit effort revolves around the identification, collection, and evaluation of evidence, most audit effort is spent in the collection process. To identify, collect, and evaluate evidence, several methods have been developed to assist in the effort. These methods include: 1) the observation of the activities being audited; 2) a review of documentation to gain a better understanding of the AIS; 3) discussions with employees about their jobs and how procedures are carried out; 4) the creation and administration of questionnaires to gather data about the system; 5) physical examination of tangible assets; 6) confirmation of the accuracy of certain information; 7) reperformance of selected calculations; 8) vouching for the validity of a transaction by examination of all supporting documentation; and, 9) analytical review of relationships and trends among information to detect items that should be further investigated. It is important to remember that only a sample of evidence is collected for audit purposes, as it is not feasible to perform audit procedures on the entire set of activities, records, assets, or documents that are under the review process in an audit. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 10 MULTIPLE CHOICE 1. The credit manager reports to the __________ and the treasurer reports to the __________. a) b) c) d) controller; vice president of finance treasurer; controller marketing manager; vice president of finance treasurer; vice president of finance 2. The revenue cycle is a recurring set of business activities and related information processing operations associated with providing goods and services to customers and collecting cash in payment for those sales. With whom is the primary external exchange of information? a) b) c) d) competitors creditors customers marketing organizations 3. What is the primary objective of the revenue cycle? a) b) c) d) to maximize revenue and minimize expense to reduce outstanding accounts receivable balances through increased cash sales to provide the right product in the right place at the right time at the right price to sell as much product as possible and/or to maximize service billings 4. To accomplish the objectives set forth in the revenue cycle, a number of key management decisions must be addressed. Which of the decisions below is not ordinarily found as part of the revenue cycle? a) b) c) d) What credit terms should be offered? How often should accounts receivable be subjected to audit? How can customer payments be processed to maximize cash flows? What are the optimal prices for each product or service? 5. Which of the activities listed below is not part of the revenue cycle? a) b) c) d) sales order entry shipping receiving billing 6. In addition to the sales order entry process there are three other processes in the revenue cycle. Which of the following is not one of them? a) b) c) d) shipping billing general ledger cash collections 7. One way to improve sales order entry efficiency is by allowing customers to enter sales order data themselves. This can be accomplished for both in-store, mail order, and Web site sales. Such interactive sales order entry systems are referred to as Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) bulletin boards. smorgasbords. catalogue boards. choiceboards. 8. One way to improve sales order entry efficiency is by allowing customers to enter sales order data themselves. For example, retail stores would send their orders directly to a sales order system in a format that would eliminate the need for data entry. This could be achieved using a) b) c) d) VMI. EDI. POS. VAN. 9. Matching customer accounts and inventory item numbers to the information in the customer and inventory master files is an example of a a) b) c) d) completeness test field check reasonableness test validity check 10. During the sales order entry process, a __________ is performed to compare the quantity ordered with the standard amounts normally ordered. a) b) c) d) completeness test redundant data check field check reasonableness test 11. During the sales order entry process, a __________ is performed to verify that each transaction record contains all appropriate data items. a) b) c) d) completeness test redundant data check field check reasonableness test 12. A number of edit checks should be performed to ensure that all of the data required to process an order have been collected and accurately recorded. The edit check that compares a quantity being ordered to past history for that item and customer is called a) b) c) d) a validity check. a reasonableness test. a completeness test. a limit check. 13. In the revenue cycle, a customer places an order for a certain product. Before the order is checked for inventory availability, what step should be taken? a) b) c) d) The customer's credit should be checked for a sale on account. The sales order should be created and written to a file. Shipping should be notified of an order in process. A picking list should be generated for the warehouse. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 14. How is credit approval generally handled for well-established customers with a documented payment history? a) b) c) d) specific authorization by the credit manager routine approval is usually granted a new credit application is taken a formal credit check is made for each sale 15. The maximum allowable account balance for a given customer is called the a) b) c) d) credit checkpoint. credit limit. reorder point. backorder point. 16. What is the normal procedure for new customers or customers making a purchase that causes their credit limit to be exceeded? a) b) c) d) routine approval is granted without authorization specific approval must be granted by the credit manager reject the sale in either case without question check the credit bureau for a credit rating on the customer 17. Why should inventory quantities on hand be checked before a sale is actually made? a) b) c) d) to inform the customer about availability and delivery times to know which items must be back ordered to inform inventory control of mistakes in the inventory records A and B above 18. When an inventory item that is not in stock has been ordered by a customer, a back order is sent to the a) b) c) d) production department. purchasing department. billing department. A and B above 19. Customer inquiries during the sales order process are best handled by a) b) c) d) a sales order and customer service person. accounting personnel. the credit manager. A and C above 20. Responding to customer inquiries and general customer service is an important aspect in the revenue cycle. Since customer service is so important, software programs have been created to help manage this function. These special software packages are called a) b) c) d) EDI systems. POS systems. VMI systems. CRM systems. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 21. Another essential part of the revenue cycle is filling customer orders and shipping merchandise to customers. Automating warehouse systems cut costs, improve efficiency, and enable more customer-responsive shipments. The essential element(s) required for an automated perpetual inventory system consist(s) of a) b) c) d) conveyor belts and forklifts conveyor belts and forklifts equipped with RFDC conveyor belts bar-code scanners 22. Once a customer order has been approved, which document is produced next? a) b) c) d) the sales invoice the packing slip the remittance advice the purchase order 23. In a shipping department, a __________ is a legal contract that defines responsibility for goods that are in transit. a) b) c) d) packing slip bill of lading picking list back order 24. The __________ is a legal contract that defines responsibility for the goods that are in transit. a) b) c) d) bill of lading freight bill sales order order acknowledgement 25. Two documents usually accompany goods sent from the vendor to the customer. What are these two documents? a) b) c) d) a bill of lading and an invoice a packing slip and a bill of lading an invoice and a packing slip an invoice and a sales order 26. For a given order, assume that goods have been picked for shipment and the items and quantities have been entered into the system. Which system update below is not triggered by these actions? a) b) c) d) any back orders are initiated inventory quantities are updated the customer accounts receivable is posted shipping documents such as the bill of lading are produced 27. The third basic activity in the revenue cycle involves billing customers and maintaining accounts receivable. What is the basic document created in the billing process? a) the bill of lading b) the purchase order Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) the packing list d) the sales invoice 28. A company uses an invoice method whereby customers typically pay according to each invoice. This is the __________ method. a) b) c) d) monthly statement open-invoice balance forward cycle billing 29. A type of accounts receivable system that matches specific invoices and payments from the customer is called a(n) __________ system. a) b) c) d) closed invoice balance forward cycle billing open invoice 30. A customer returns a document along with cash payment. The document identifies the source and the amount of the cash payment. It is called a a) b) c) d) remittance advice. remittance list. credit memorandum. debit memorandum. 31. With a(n) __________ system, customers pay according to the amount showing on their monthly statement and payments are simply applied against the total account balance. a) b) c) d) closed invoice open invoice balance forward invoice forward 32. In billing systems, the __________ is sent to the customer that summarizes all transactions occurring during a given period of time and it indicates the amount due. a) b) c) d) remittance list monthly statement invoice aging report 33. When a customer pays off the balance on an invoice, the transaction is credited to the __________ file. a) b) c) d) customer master sales transaction cash receipts All of the above are correct. 34. A type of business document in which part of the original document is returned to the source for further processing is called a __________ document. a) feedback Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) returnable c) closed-loop d) turnaround 35. A __________ system spreads out the monthly statements to customers over the entire month with the idea being that the processing load and cash flow will be more even. a) b) c) d) closed invoice open invoice cycle billing balance forward 36. The last step in the revenue cycle is cash collections. The accounts receivable department must know when customers pay their invoices, yet segregation of duty controls dictate that the collection and recording functions be kept separate from each other. What is a solution to this potential internal control problem? a) b) c) d) have customers send a remittance advice with their payment have mailroom personnel prepare a remittance list which can be forwarded to accounts receivable establish a lockbox arrangement with a bank all of the above 37. The benefits of a cash lockbox system are maximized when a) b) c) d) the bank is located close to the company. several banks around the country are used. only one bank is designated. EFT is used. 38. A system where the bank electronically notifies a company about customers' remittances received through the postal system is known an a) b) c) d) e-cash system. electronic lockbox. electronic funds transfer (EFT). electronic data interchange (EDI). 39. When customers send their remittances electronically to the company's bank, this is called a) b) c) d) FEDI. EFT. to use procurement cards. an electronic lockbox. 40. Automating the cash collection process is a desirable goal of the organization. A way to incorporate the advantages of EDI with the electronic funds transfer process is a) b) c) d) FEDI. EFT. to use procurement cards. an electronic lockbox. 41. Key differences exist when an integrated Enterprise Resource Planning system (ERP) replaces an existing AIS or legacy system. For example, __________ are more Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 accurate and timely, enabling sales order entry staff to provide customers more accurate information about delivery dates. a) b) c) d) inventory records cash receipts credit approval decisions exception reports 42. When an ERP is used, it is assumed that there will be increases in efficiency and the effectiveness of the activities related to the revenue cycle. However, what must be in place and functioning well to fully realize these benefits? a) b) c) d) an effective marketing staff all the components of the expenditure cycle adequate controls adequate system flowchart documentation 43. Well-designed AIS controls must ensure that all transactions are authorized, valid, and properly recorded. In addition, there are three other AIS objectives. Which is not an AIS objective? a) b) c) d) transactions are recorded accurately transactions are matched into the proper time period assets are safeguarded from loss or theft business activities are performed efficiently and effectively 44. The activities involved in soliciting and processing customer orders within the revenue cycle are known as the __________. a) b) c) d) sales order entry process shipping order process revenue process marketing process 45. To ensure proper separation of duties the __________ makes decisions concerning issuance of credit memos. a) b) c) d) accounts receivable supervisor warehouse manager credit manager cashier 46. It has been discovered that credit sales have been made to customers with a poor credit rating. If this activity continues, the company may face uncollectible sales and losses due to bad debts. What applicable control procedure may help the company to gain control over this situation? a) b) c) d) separation of shipping and billing duties credit approval by a credit manager and not marketing personnel data entry application controls price lists 47. Consider the following revenue cycle scenario: The company has been exposed to customer dissatisfaction and the suggested control procedure to be implemented is to install and use bar-code scanners. What is the threat? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) The company may be shipping the wrong merchandise. The company may be shipping the wrong quantities of merchandise. The company may be shipping orders to the wrong address. All of the above threats may apply to this scenario. 48. Which of the following would be the least effective control to minimize the loss of inventory? a) b) c) d) secure the storage location of inventory release inventory only with proper documentation periodically back up all perpetual inventory records reconcile the physical and book inventories 49. One applicable control procedure is to separate the shipping and billing functions within an organization. This control feature is designed to neutralize the threat of a) b) c) d) the failure to bill customers. billing errors. loss of data. poor performance. 50. A company fails to bill customers due to a lack of controls. The exposure the company faces is a) b) c) d) customer dissatisfaction. an overstated accounts receivable balance. a loss of inventory and revenue. uncollectible sales and losses due to bad debts. 51. All of the following edit checks for online editing of accounts receivable transactions would probably be included except a) b) c) d) validity checks on customer and invoice numbers. check digit verification on the amount of the sale. closed loop verification on the customer name to ensure the proper account is being updated. field checks on the values in dollar fields. 52. When a proper segregation of duties exists in the area of handling cash receipts, the __________, who reports to the __________, actually handles the cash and is not the same person who posts cash receipts to customer accounts. a) b) c) d) cashier; treasurer cashier; controller accountant; treasurer accountant; controller 53. In a cash collection system with proper controls, the __________ function, responsible to the __________, is separate and distinct from the cash handling activities. a) b) c) d) accounts receivable; treasurer accounts receivable; controller cashier; controller cashier; treasurer Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 54. A serious exposure for an organization that is connected with the revenue cycle is the loss of assets. What is the related threat and applicable control procedure association with this exposure? a) b) c) d) shipping errors; reconciliation of sales order with picking ticket and packing slip theft of cash; segregation of duties and minimization of cash handling loss of data; backup and recovery procedures poor performance; preparation and review of performance reports 55. Which of the following duties could be performed by the same individual and not violate segregation of duty controls? a) b) c) d) handling cash and posting to customer accounts issuing credit memos and maintaining customer accounts handling cash and authorizing credit memos handling cash receipts and mailing vendor payments 56. To prevent the loss of valuable data in the revenue cycle, internal file labels can be used to a) b) c) d) keep competitors from accessing files. record off-site storage locations. organize the on-site physical storage site. reduce the possibility of erasing important files. 57. In the shipping area of the company, the __________ is used to obtain the goods from the warehouse facility and prepare them for shipment to the customer. a) b) c) d) picking ticket packing slip bill of lading invoice SHORT ANSWER 58. a) Define revenue cycle. b) What are the basic revenue cycle activities? 59. Explain how validity checks, completeness tests and reasonableness tests can be users to ensure accuracy of customer ordes. 60. What is a CRM system? 61. How can EDI help the billing and account receivable process? 62. How does a company avoid overbilling customers for items not yet shipped? 63. In billing and accounts receivable, what documents are commonly used? 64. Why is credit approval an important part of the revenue cycle? 65. Name and briefly define the two types of accounts receivable systems. 66. What is cycle billing? 67. Poor performance in the area of cash collections is a threat to the business. What controls can be used to help neutralize this threat? 68. A well-designed AIS should provide adequate controls to ensure that objectives in the revenue cycle are met. What are those objectives? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ESSAY 69. Discuss ways in which information technology can be used to streamline cash collections. 70. Describe four threats and identify appropriate controls for each threat in the revenue cycle. 71. Discuss the general control issue of the loss of data as it relates to the revenue cycle. 72. Explain how to effectively segregate duties in the sales order cycle. 73. Discuss the revenue cycle threat of stockouts, carrying costs, and markdowns. ANSWER KEY 1) D 2) C 3) C 4) B 5) C 6) C 7) D 8) B 9) D 10) D 11) A 12) B 13) A 14) B 15) B 16) B 17) D 18) A 19) A 20) D 21) D 22) B 23) B 24) A 25) B 26) C 27) D 28) B 29) D 30) A 31) C 32) B 33) A 34) D 35) C 36) D 37) B 38) B 39) B 40) A 41) A Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) 61) 62) 63) 64) 65) C B A C B D C A C B A B B D D A a) The revenue cycle is a recurring set of business activities and related information processing operations associated with providing goods and services to customers and collecting cash in payment for those sales. b) The basic activities in the revenue cycle are: order entry - soliciting and processing customer activities- filling customer orders and shipping merchandise- invoicing customers and maintaining customer accounts collections - the cashier handles remittances and deposits them in the bank; accounts receivable personnel credits customer accounts for the payments received Validity checks can be used to compare the customer and inventory information on the customer order with the information in the customer and inventory master files. A completeness test can ensure that all the necessary information is present on the customer order. A reasonableness test can compare the quantity ordered with the customer's past order history for that item. CRM stands for customer relationship management. Since customer service is so important today, special CRM software packages have been created that support this vital process. CRM systems help a company to organize detailed data about customers so that more personalized service can be given to them. A CRM system may retain customer preferences and customer transaction history, which can be used to suggest other products the customer may wish to purchase. The system could also take a pro-active marketing approach in contacting customers at certain re-order points. A well-implemented CRM system can help the business achieve the goal of turning satisfied customers into loyal customers. The basic document created in the billing process is the sales invoice. Many companies still print paper invoices and send them to customers in the mail. Batch processing of invoices may create cash flow problems because of the time it takes invoices to flow through the regular mail system. Companies that use EDI can create quicker turnaround for payment, and save costs by reducing paper handling and processing. Depending on the number of invoices processed per year, these savings can be significant. By having the shipping department personnel enter actual quantities shipped into the system that processes and creates the sales invoices. Sales invoice notifies customer of amount to be paid. Monthly statement summarizes all transactions that occurred during month. Credit memo authorizes the billing department to credit the customer's account, should be issued by credit manager Most business-to-business sales are made on credit. Key to revenue cycle success is the approval of credit sales before they are processed and goods shipped. A part of good control in this area is to establish a credit limit for customers. With new customers, or when orders exceed a customer's credit limit, or the customer has a past due balance, specific authorization for the credit manager should specifically authorize and approve further credit. The system can also be programmed to do a limit check for each order processed to maintain further control in this area. Also, marketing personnel should not make credit decisions, as a potential conflict of interest is possible. Open invoice system - customers pay the invoice by returning a remittance advice turnaround document and a check. Remittances are applied against specific open invoices.The open-invoice method can be used to offer discounts for prompt payments since invoices are individually Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 66) 67) 68) 69) 70) 71) tracked. However, such individual tracking adds complexity in maintaining information. Balanceforward method - customers pay according to the amount shown on a monthly statement and remittances are applied against the total outstanding balance; this method is used by department stores typically where customers make a large number of smaller dollar amount purchases. Cycle billing is spreading out the customer base so that a portion of the billing is done each day to a group of customers. Credit card and utility companies use it extensively because of their large customer bases. The advantage of this method is that the billing load is dispersed and the cash flow of the company is evened out dramatically. Both accounts receivable and cash flows should be monitored. Segregation of duty controls should always be implemented and monitored for compliance. Also, a control used to deal with accounts receivable (which directly impacts cash flow) is to use an accounts receivable aging schedule. This schedule lists customer account balances by length of time outstanding and provides information for estimating bad debts. It can also assist in evaluating credit policies and specific customer credit limits. Also, a cash budget can be used to provide a more precise estimate of cash inflows (cash collected from sales) and cash outflow (outstanding payables). An organization can be alerted to a pending cash flow shortage, thus enabling it to secure short-term financing at competitive rates to deal with the problem in a timely manner. 1. All transactions are properly authorized. 2. All recorded transactions are valid. 3. All valid, authorized transactions are recorded. 4. All transactions are recorded accurately. 5. Assets are safeguarded from loss or theft. 6. Business activities are performed effectively and efficiently. Answers may include the following points: A lockbox system can reduce delays due to processing and geographical distance between customer and company. Customers send remittances to a nearby P.O. box; a local bank picks up remittances, deposits cash and sends remittance advices and copies of all checks to the company. The main disadvantage is cost; the banks charge a service fee up to 1% of the cash processed through the system. Information technology can provide additional efficiencies in the use of lockboxes. An electronic lockbox sends electronic notification of remittances to the company. This method enables the company to begin applying remittances to customer accounts before the photocopies of the checks arrive. ---- An EFT system eliminates paper checks and uses electronic payments between banks. Integrating EFT and EDI, called the financial electronic data interchange, automates billing and cash collections. ---Procurement cards or credit cards can be used. These cards eliminate the risks and costs associated with creating and maintaining accounts receivable, but cost between 2% to 4% of the gross sales price. Threat 1: Sales to customers with poor credit - Controls: Having an independent credit approval function and maintaining good customer accounting can help to prevent problems. 2: Shipping errors - Controls: Reconciling shipping notices with picking tickets; bar-code scanners; and data entry application controls will help to catch these errors. 3: Theft of inventory - Controls: Secure the location of inventory and document transfers; release only with valid shipping orders; have good accountability for picking and shipping; and finally, periodically reconcile records with a physical count. 4: Failure to bill customers - Controls: Separating shipping and billing and prenumbering of shipping documents helps along with reconciliation of all sales documents. 5: Billing errors - Controls: Reconciliation of picking tickets and bills of lading with sales orders; data entry edit controls; and price lists may prevent billing errors. 6: Theft of cash - Controls: Segregation of duties is essential to prevent this serious problem (the following duties should be separate: handling cash and posting to customer accounts; handling cash and authorizing credit memos and adjustments; issuing credit memos and maintaining customer accounts); use of lockboxes for receipts and EFT for disbursements; mailing customer statements monthly; use cash registers in retail operations where cash payments are received; deposit cash daily in the bank; and have the bank reconciliation function performed by independent third parties. 7: Posting errors in updating accounts receivable - Controls: Use of editing and batch totals is essential here. 8: Loss of data - Controls: Regular backups are essential with one copy stored off-site; and logical and physical access controls to prevent leakage to competitors and irregularities. 9: Poor performance Controls: Use sales and profitability analyses; accounts receivable aging; and cash budgets to track operations. One of the two general objectives that pertain to all revenue cycle activities is the loss of data. The primary threats related to the data availability objective are the loss of data and access controls. It Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 is imperative that accurate customer account and inventory records be maintained for external and internal reporting purposes and for customer inquiries. Such records must be protected from loss and damage by using backup files. One backup file should be kept on-site, while a second should be kept off-site. Backup files of the most recent transactions should also be maintained. Also, all disks and tapes should have both external and internal file labels to reduce the possibility of accidental erasure of important files. Access controls are also important as a general control. Unauthorized access to information may cause leaks of the information to competitors and the risk of damage to sensitive and important data files. Employees should have certain access restrictions to help prevent this threat from occurring. Passwords and user IDs will help to limit access to files and the operations allowed to be performed on files. For example, the sales staff should not be allowed write-access to customers' credit limit and approval information. Individual terminals should also have access controls in place. An example of this control would be to prevent someone at a shipping dock terminal from entering a sales transaction order. Another control that should be put in place is to require activity logs of any management approved transaction. Such a log should be maintained for audit trail purposes. 72) Recording - should be done by sales order personnel - by the credit manager, not sales order, also, use of sales order to authorize release of goods to shipping. - separate warehouse and stores personnel, and shipping, all separate from sales. Because a computer does recording and authorization, it is important to ensure integrity of the programs and to perform edit checks on any online entries 73) Stockouts, carrying costs, and markdowns are a threat in the sales order entry process. The problem with stockouts is that when goods are not available to ship to customers, the business risks losing the sale to a competitor that can provide the goods in a timely manner. The opposite problem can also occur where excess inventory increases carrying costs, with the result that markdowns may be necessary in order to sell the inventory. Two controls can be implemented to cope with this threat. One control that can be put into place is to establish accurate inventory control. An AIS with real-time online capabilities can be programmed to use the perpetual inventory method. This will ensure that accurate records are maintained about the quantity of inventory for sale. This will eliminate mistakes in placing orders for goods when a sufficient inventory amount is on hand. Periodic physical counts of inventory will also verify the perpetual amounts recorded by the AIS. Another important control in this situation is that of accurate sales forecasting. Proper marketing efforts should be made in conjunction with regularly reviewing sales forecasts for accuracy. Such forecasts should be revised as necessary. Sales force marketing efforts should be commensurate with inventory levels as well. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 11 MULTIPLE CHOICE 1. In the expenditure cycle, the primary external exchange of information occurs with a) b) c) d) customers. suppliers. management. the audit committee. 2. Within the expenditure cycle, internal information flows a) b) c) d) from the production cycle to the expenditure cycle. from the revenue cycle to the expenditure cycle. to the general ledger from the expenditure cycle. All of the above are correct. 3. To accomplish the objectives set forth in the expenditure cycle, a number of key management decisions must be addressed. Which of the decisions below is not ordinarily found as part of the expenditure cycle? a) b) c) d) How can cash payments to vendors be managed to maximize cash flow? What is the optimal level of inventory and supplies to carry on hand? Where should inventories and supplies be held? What are the optimal prices for each product or service? 4. There are three basic activities in the expenditure cycle. One of the basic activities is the receiving and storage of goods, supplies, and services. What is the counterpart of this activity in the revenue cycle? a) b) c) d) the sales order entry process the shipping function the cash collection activity the cash payments activity 5. The first major business activity in the expenditure cycle is ordering inventory and supplies. The traditional approach to management of inventory to ensure sufficient inventory to maintain production is known as a) b) c) d) safety stock. just-in-time production. economic order quantity. optimal inventory quantity. 6. EOQ includes several variables that must be taken into consideration when calculating the optimal order size. One variable, the costs associated with holding inventory, is referred to as a) b) c) d) ordering costs. carrying costs. the reorder point. stockout costs. 7. The decision of when to place an order in a traditional inventory system is specified by the a) company inventory policies. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) economic order quantity. c) stockout point. d) reorder point. 8. When goods are being ordered from a vendor, which electronic files are either read or updated? a) b) c) d) inventory, vendors, and accounts payable vendors and accounts payable open purchase orders and accounts payable inventory, vendors, and open purchase orders 9. One alternative approach to managing inventory is materials requirements planning (MRP). What is a key feature of this approach? a) b) c) d) to minimize or entirely eliminate carrying and stockout costs to reduce required inventory levels by scheduling production rather than estimating needs to determine the optimal reorder point to determine the optimal order size 10. The major advantage of an MRP inventory system is that it reduces inventory levels. This is because a) the uncertainty about when materials are needed is reduced, thus reducing the need to carry large levels of inventory. b) the system is able to compute exactly the cost of purchasing by taking into account all costs associated with inventory carrying. c) inventory is brought to the production site exactly when needed and in the correct quantities by the vendor. d) None of the above are correct. 11. The inventory management approach that attempts to minimize, if not eliminate, carrying and stockout costs is a) b) c) d) the materials requirements planning. the economic order quantity. a just-in-time inventory system. There is no such inventory management approach. 12. What aspect below best characterizes a JIT inventory system? a) b) c) d) frequent deliveries of smaller quantities of items to the work centers frequent deliveries of large quantities to be held at the work centers less frequent deliveries of large quantities of goods to central receiving infrequent bulk deliveries of items directly to work centers 13. What is the key difference between the MRP and JIT inventory management approaches? a) b) c) d) Only JIT reduces costs and improves efficiency. MRP is especially useful for products such as fashion apparel. JIT is more effectively used with products that have predictable patterns of demand. MRP schedules production to meet estimated sales needs; JIT schedules production to meet customer demands. 14. MRP will be a preferred method over JIT when the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) demand for inventory is fairly predictable. demand for inventory is mostly unpredictable. product has a short life cycle. None of the above are correct. 15. A key decision in ordering is selecting a suitable vendor. Which of the following would not be a major criterion in vendor selection? a) b) c) d) prices of goods quality of goods credit rating of the vendor ability to deliver on time 16. Once a vendor is selected for a product, the company's identity is recorded in the a) b) c) d) general ledger. purchase requisition file. product inventory transaction file. product inventory master record. 17. The paper document or electronic form that formally requests a supplier to sell and deliver specified products at designated prices is called a) b) c) d) a purchase order. a materials requisition. a sales invoice. a receiving report. 18. A purchase order is a) b) c) d) a document formally requesting a vendor to sell a certain product at a certain price. a request for delivery of certain items and quantities. a contract between the buyer and vendor once accepted by the vendor. All of the above are true. 19. A standing order to purchase specified items at a designated price, from a particular supplier for a set period of time, is called a a) b) c) d) set order. blanket purchase order. purchase order. commodity order. 20. A major cost in the purchasing function is the number of purchase orders processed. One technique that may reduce purchasing-related expenses is to have suppliers compete with each other to meet demand at the lowest price. This name of this technique is a) b) c) d) an EDI auction. a trading exchange. a reverse auction. a supplier consortium. 21. The receiving and storage of goods is the responsibility of the receiving department, which usually reports to the __________ function in the company. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) inventory control stores production purchasing 22. The receiving department has two major responsibilities in connection with the expenditure cycle. Identify one of these responsibilities. a) b) c) d) shipping products most efficiently and at the lowest cost deciding if the delivery should be accepted verifying any purchase discounts for the delivery deciding on the location where the delivery will be stored until used 23. Which of the following is generally not shown on a receiving report? a) b) c) d) price of the items quantity of the items purchase order number counted and inspected by 24. A receiving clerk notes that a delivery of 10 units has been received, but the purchase order specified 12 units. A debit memo will be prepared to adjust for the difference in the quantity ordered and received. Who should prepare this document? a) b) c) d) the receiving clerk management the sales department the purchasing department 25. Identify which of the following scenarios the buyer could adjust by using a debit memo document. a) b) c) d) quantity different from that ordered damage to the goods goods that fail inspection for quality All of the above are possible scenarios. 26. What is one of the best ways to improve the overall efficiency and effectiveness of the receipt and storage of ordered items? a) requiring all suppliers to have a second party verify quantities purchased before shipment b) requiring all suppliers to have bar-codes on their items to allow electronic scanning upon delivery by the receiving department c) requiring all suppliers to use EDI to expedite the receiving department function d) requiring all delivery trucks to have satellite data terminals to expedite the receiving department function 27. All of the following technologies could be useful aids in the receiving process except a) b) c) d) bar coding. radio frequency identification tags. EFT. satellite technology. 28. Vendor invoices are approved by the __________, which reports to the __________. a) purchasing department; controller Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) accounts payable department; treasurer c) purchasing department; treasurer d) accounts payable department; controller 29. From a legal standpoint, when does the obligation to pay a vendor arise? a) b) c) d) when the goods are requisitioned when the goods are ordered when the goods are received by the purchaser when the goods are billed 30. The disbursement voucher and supporting documents are sent to the __________ for payment prior to the due date. a) b) c) d) cashier treasurer controller accounts payable department 31. A __________ system is a system in which an approved invoice is posted to the vendor account and is stored in an open invoice file until payment is made by check. a) b) c) d) voucher nonvoucher cycle blanket invoice 32. A disbursement voucher contains a) b) c) d) a list of outstanding invoices. the net payment amount after deducting applicable discounts and allowances. the general ledger accounts to be debited. All of the above are correct. 33. A legal obligation arises at the time goods are received from a supplier. The objective of accounts payable is to authorize payment only for goods or services actually ordered and received. The best way to process supplier invoices is to use a) b) c) d) electronic funds transfer for small, occasional purchases from suppliers. a nonvoucher system. EDI for all small, occasional purchases from suppliers. a disbursement voucher system. 34. What is not an advantage to using disbursement vouchers? a) Disbursement vouchers reduce the number of checks written. b) Disbursement vouchers can be prenumbered which simplifies the tracking of all payables. c) Disbursement vouchers facilitate separating the time of invoice approval from the time of invoice payment. d) There are no disadvantages to using disbursement vouchers. 35. Which of the following is not an advantage of a voucher system? a) b) c) d) several invoices may be included on one voucher, reducing the number of checks disbursement vouchers may be pre-numbered and tracked through the system the time of voucher approval and payment can be kept separate it is a less expensive and easier system to administer than other systems Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 36. What is the final activity in the expenditure cycle? a) b) c) d) ordering goods receipt and storage of goods approving vendor invoices for payment the payment of approved invoices 37. In a typical cash disbursement procedure, who usually handles the checks and may even be able to sign checks up to a certain dollar limit? a) b) c) d) the accounts payable supervisor the controller the cashier the treasurer 38. Duties in the expenditure cycle should be properly segregated to promote internal control. This means that the authorization function is performed by __________, the recording function is performed by __________, and the cash disbursement function is performed by the __________. a) b) c) d) accounts payable; purchasing; cashier purchasing; accounts payable; cashier purchasing; cashier; accounts payable purchasing; accounts payable; treasurer 39. A voucher package should include a) b) c) d) a purchase requisition, vendor invoice, and receiving report. a purchase order, vendor invoice, and receiving report. a purchase requisition, purchase order, and receiving report. a bill of lading and vendor invoice. 40. The evaluated receipt settlement (ERS) replaces the more traditional 3-way matching process with a 2-way match of the purchase order and the a) b) c) d) vendor invoice. sales invoice. receiving report. disbursement voucher. 41. What may be the biggest opportunity to improve the efficiency of accounts payable? a) b) c) d) convert a manual AIS system to EDI and EFT streamline noninventory purchases use ERS use disbursement vouchers 42. When purchasing miscellaneous supplies, companies can reduce costs, improve efficiency, and combat employee fraud by using a) b) c) d) procurement cards. a JIT inventory system. credit cards. debit cards. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 43. If available, a 1% discount for payment within 10 days represents an approximate savings of __________ % annually. a) b) c) d) 1 12 18 36 44. When a legacy system is replaced with an integrated Enterprise Resource Planning (ERP) system, many benefits are realized for the organization. What is a key improvement in the record keeping function? a) b) c) d) Any department can now submit a request to purchase items. The system tracks the exact time of delivery. Major suppliers send electronic notification of incoming deliveries. Inventory records are more accurate and timely. 45. The threat of paying prices that are too high for goods ordered can pose a problem in the expenditure cycle. What is an appropriate control that would be applicable to help mitigate this threat? a) b) c) d) require the receiving department to verify the existence of a valid purchase order use only approved suppliers and solicit competitive bids only pay invoices that are supported by the original voucher package use bar-code technology 46. What is probably the most effective control for the prevention of kickbacks to purchasing agents? a) b) c) d) purchasing from approved vendors good supervision in the purchasing area a corporate policy to prohibit purchasing agents from accepting kickbacks reviews of vendor performance 47. There are several threats that are associated with the process and activity of receiving and storing goods. Identify one of these threats below. a) b) c) d) errors in counting kickbacks requests for unnecessary items errors in vendor invoices 48. What is the easiest way to prevent the acceptance of unordered goods? a) order only from approved vendors b) always require that a valid purchase order exists before goods can be accepted at the time of delivery c) have an appropriate conflict of interest policy in place d) require receiving personnel to call the vendor before accepting any goods 49. Which of the following is not a common control for ensuring inventory is secure and inventory counts are accurate? a) control of physical access to the inventory storage areas b) transfers of inventory with proper documentation c) sending "blind" copies of purchase orders to inventory control for data entry Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) making physical counts of inventory at least once per year 50. Double-checking the accuracy of an invoice is an applicable control that can help to neutralize a threat in the expenditure cycle. What process or activity would specifically be associated with this control? a) b) c) d) order goods receive and store goods pay for goods and services general issues 51. There is a threat of paying an invoice twice. What is an applicable control that may help mitigate this threat? a) b) c) d) payment should never be authorized for a photocopy of an invoice double-check invoice accuracy approval of a purchase order adequate perpetual inventory records 52. Which control would be best to prevent payments made to fictitious vendors? a) b) c) d) allow payments only to approved vendors restrict access to any payment or approval documents have an independent bank reconciliation make sure all documents are in order before approving payments 53. In the expenditure cycle, good control dictates that expenditures should be paid by check. This may not be feasible when minor purchases are made. To facilitate quick payment for minor purchases, a(n) __________ should be set up and maintained using __________. a) b) c) d) special bank account; disbursement vouchers imprest fund; vouchers cash box; small denomination bills petty cash fund; procurement cards 54. A surprise count of petty cash by the auditor should find the total of __________ equal to the amount authorized for the fund. a) b) c) d) cash and credit memos cash and petty cash vouchers cash cash and checks 55. Special care should be taken when EFT payments are made to vendors. What control should be put in place that assigns responsibility for EFT payments? a) b) c) d) encrypt all EFT transmissions time stamp all EFT transactions establish a control group to monitor EFT transactions for validity and accuracy number all EFT transactions 56. Which of the following threats is not specific to the purchase requisition process of the expenditure cycle? a) stockouts Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) purchasing from unauthorized vendors c) requisitioning goods not needed d) All of the above are threats in the purchase requisition process. 57. The loss of data is a threat encountered in the expenditure cycle. What is the related process/activity and applicable control used to counteract the threat? a) b) c) d) order goods; backup and disaster recovery plans general issues; backup and disaster recovery plans general issues; development of periodic review of appropriate performance reports order goods; various data entry and processing edit controls SHORT ANSWER 58. a) Define expenditure cycle. b) What are the basic expenditure cycle activities? 59. What is the EOQ approach? What are the components of EOQ? 60. Define the materials requirement planning (MRP) 61. Define just-in-time (JIT) inventory methods. 62. Briefly discuss the differences among EOQ, MRP, and JIT. 63. a) What is the major cost driver in the purchasing function? b) How can information technology be used to control this cost driver? 64. How is the expenditure cycle a "mirror image" of the revenue cycle? 65. What are the possible problems associated with receiving goods ordered from a vendor? 66. Name and describe the two common systems for approving vendor payments. 67. How can information technology be used to improve the vendor invoice approval process? ESSAY 68. Under what conditions is MRP preferable to JIT and vice versa? 69. In the expenditure cycle, the majority of payments made are by check. What are some control issues related to payment of vendors by check? 70. Identify ten threats and applicable control procedures for each in the expenditure cycle. 71. What types of decision-making and strategic information should the AIS provide in the expenditure cycle? 72. How can using bar codes on goods or products provide significant benefit in the expenditure cycle? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1) B 2) D 3) D 4) B 5) C 6) B 7) D 8) D 9) B 10) A 11) C 12) A 13) D 14) A 15) C 16) D 17) A 18) D 19) B 20) C 21) C 22) B 23) A 24) D 25) D 26) B 27) C 28) D 29) C 30) A 31) B 32) D 33) D 34) D 35) D 36) D 37) C 38) B 39) B 40) C 41) B 42) A 43) C 44) D 45) B 46) C 47) A 48) B 49) C 50) C 51) A 52) A 53) B 54) B Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55) 56) 57) 58) C B B a) The expenditure cycle is a recurring set of business activities and related data processing operations associated with the purchase of and payment for goods and services. The basic activities in the expenditure cycle are: Requesting the purchase of needed goods. Ordering goods to be purchased. Receiving ordered goods. Approving vendor invoices for payment. Paying for goods purchased. 59) EOQ (economic order quantity) is the traditional inventory control method to maintain sufficient inventory levels so production can continue without interruption. EOQ should take into account a situation where inventory use is greater than expected. EOQ calculates the optimal order size to minimize the sum of ordering, carrying, and stockout costs. Ordering costs - all expenses associated with processing purchasing transactions. Carrying costs - costs associated with holding inventory. Stockout costs - costs from inventory shortages, such as lost sales or production costs. 60) Materials requirements planning (MRP) is an inventory management technique that seeks to reduce required inventory by better scheduling production. MRP basically estimates the sales demand for a product. 61) Just-in-time (JIT) is another inventory management technique that minimizes carrying and stockout costs by having deliveries made in quantities and at the time needed for production based on customer demand. 62) Economic Order Quantity (EOQ) is the traditional approach to managing inventory. EOQ is used to find the optimal order size. Ordering costs, carrying costs, and stockout costs are considered in finding the EOQ. The MRP (Materials Requirements Planning) inventory method seeks to reduce inventory levels by scheduling production, based on estimated sales, rather than by estimating needs (which EOQ does). A just-in-time inventory system (or JIT) attempts to minimize, if not totally eliminate, both carrying and stockout costs through the frequent delivery of small amounts of materials, parts, and supplies when they are needed. JIT does not attempt to estimate needs or schedule production based on estimated sales, as it is based on customer demand at a given time. A JIT system almost eliminates finished goods inventory. 63) a) The major cost driver in the purchasing function is the number of purchase orders processed. b) The number of purchase orders can be reduced or streamlined by: Electronic data interchange (EDI) for transmitting purchase orders to vendors. Use procurement cards for small dollar and small quantity purchases of non-inventory items. Reduce clerical costs by using the Internet to perform certain purchasing functions. Use vendor-managed inventory programs to reduce purchasing and inventory costs. 64) The expenditure cycle has been called a "mirror image" of the revenue cycle because the activities of the expenditure cycle are the opposite, or "reflection" of several activities found in the revenue cycle. For example, the order goods activity generates a purchase order, which serves as customer input to the sales order entry process. The receive goods activity handles the goods sent via the supplier's shipping function. The pay for goods activity generates the payments that are processed by the supplier's cash collection activity. This mirror image also means that major technological improvements in the expenditure cycle may bring about complementary improvements in suppliers' revenue cycle as well. 65) When a shipment of goods arrives, the quantity of goods received may not be the same as the quantity ordered; the goods may have been damaged in shipment and therefore are not suitable for use; and, goods may be received that are inferior in quality and fail an inspection. Whenever any of these problems occur, the purchasing department should deal with the vendor and issue a debit memo to record an adjustment to the order. The vendor should then issue a credit memo in acknowledgment of the problem and the pending adjustment. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 66) Non-voucher (open invoice) system - approved invoices are posted to vendor records and stored in an open invoice file; checks are written for each individual invoice; when paid, the documents are marked "paid" and placed in a paid invoice file. Voucher system - a disbursement voucher is prepared to summarize information contained in a set of vendor invoices and specify the general ledger accounts to be debited; the voucher authorizes the cashier to make payment to the vendor. The voucher system reduces the number of checks written since several invoices can be paid by one check. 67) EDI eliminates the need to enter invoice data and the matching of payment documents - all of this can be done using computers and network technologies. Technology can eliminate the need for vendor invoices by approving payment upon receipt of the goods. Imaging systems can eliminate paper flow, and universal languages such as XML can provide a paperless means of receiving and storing vendor invoices. Use of procurement cards, credit cards, and electronic expense forms can improve the efficiency of non-inventory purchases. 68) MRP systems schedule production based on estimated sales, and JIT systems schedule production based on customer demand. The choice between these two systems is based on the types of products a company sells. For example, products that have predictable patterns of demand and a long life cycle are more suitable for MRP systems. In this case, sales can be forecast with greater accuracy. Conversely, if the product has an unpredictable pattern of demand and a shorter life cycle, then a JIT system is more suitable. JIT is able to adapt better to continuously changing production levels. 69) Key control problems in the area of payment by check can give rise to fraudulent activity. Fraudulent disbursements made by check to fictitious suppliers are one of the most common types of fraud. Control over checks can be strengthened in a number of ways. First, all checks should be sequentially pre-numbered and kept under lock and key until use. The cashier should randomly audit the supply of unused checks and verify that none are missing. Use of the voucher system will also provide control over paying a "phantom" supplier, since several supporting documents must be present in the voucher packet in order to have a check issued. The cashier and/or treasurer should be the only parties authorized to sign checks. Two signatures should be required on all checks in excess of a predetermined dollar amount to provide independent review of large expenditures. Also, signed checks should not be returned to accounts payable, but should be mailed by the cashier or treasurer. When a check is issued, all documents in the voucher package should be cancelled so that the voucher cannot be resubmitted for payment. To provide another independent review of checking account activity, someone not connected with either accounts payable or the treasurer's office should reconcile all bank accounts. To help circumvent check alteration and forgery, check protection machines should be used to write the dollar amount of the check as well as the date. The paper the check is printed on should have some special watermark or identifying mark that is readable at a certain angle as well. 70) Answers can include the following information:1: Stock-outs - Controls: Inventory control system; accurate perpetual inventory; and vendor performance analysis is needed to prevent this problem 2: Requesting goods not needed - Controls: Review and approval by supervisors; use of prenumbered requisition forms; and restricted access to blank purchase orders 3: Purchasing goods at inflated prices - Controls: Competitive bidding and proper supervision; approved purchase orders; and price list consultations are needed to prevent this problem 4: Purchasing goods of inferior quality - Controls: Use experienced buyers who know good vendors; review purchase orders; and incorporate approved vendor list into formal procedures 5: Purchasing from unauthorized vendors - Control: Pre-numbered purchase orders should be approved; restrict access to approved vendor list and have procedures in place for any change to the list 6: Kickbacks paid to buyers to influence their decisions - Controls: Clear conflict of interest policy prohibiting the acceptance of any gift from vendors; disclosure of financial interest policy for purchasing agents; and vendor audits Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7: Receiving unordered goods - Controls: Receiving department must reject any goods for which there is no approved purchase order 8: Errors in counting goods received - Controls: Use "blind" P.O. copies to force receiving personnel to actually count goods; provide incentives for counting goods 9: Theft of inventory - Controls: Secure inventory storage locations; make transfers of inventory with proper approval and documentation; do periodic physical count and reconciliation with recorded amounts 10: Errors in vendor invoices - Controls: Invoice accuracy should be verified and compared to P.O.s and receiving report data 11: Paying for goods not received - Controls: Voucher package and original invoice should be necessary for payments 12: Failure to take available purchase discounts - Controls: File approved invoices by due date; track invoices by due date; use a cash budget to plan for cash needs 13: Paying same invoice twice - Controls: Invoices should be approved only with a full voucher package and paid ones should be canceled so they cannot be used again; do not pay invoices marked "Duplicate" or "Copy" 14: Recording and posting errors for purchases and payments - Controls: Data entry controls, and periodic reconciliation of subsidiary ledger with general ledger control account 15: Misappropriation of cash by paying fictitious vendors and alteration of checks - Controls: Restrict access to cash, blank checks, and check signing machine; use check protection, prenumbered checks, and imprinted amounts on checks to cut down on forgery and fraud; use petty cash fund for small expenditures only; have proper segregation of duties and independent bank reconciliation function 16: Theft associated with EFT use - Controls: Access controls to the system; encryption of transmissions; time-stamp and number transmissions; control group should monitor all EFT activity 17: Loss of data - Controls: Use file labels, back up of all data files regularly; and, use access controls 18: Poor performance - Controls: Preparation and review of performance reports 71) The AIS should provide decision making information to: Determine when and how much additional inventory to order. Select the appropriate vendors from whom to order. Verify the accuracy of vendor invoices. Decide whether purchase discounts should be taken. Monitor cash flow needs to pay outstanding obligations. AIS should also provide the following strategic and performance evaluation information on: Efficiency and effectiveness of the purchasing department. Analysis of vendor performance such as on-time delivery, quality, etc. Time taken to move goods from the receiving dock into production. Percentage of purchase discounts taken 72) Bar codes can significantly improve the process of receiving goods from suppliers for several reasons. First, a bar code can easily be scanned electronically. Electronically capturing the unique bar code number of a product not only provides identification and quantity data about the product; it can also provide specific production information such as date and time of manufacture, production run information, etc. Electronically encoding such information into an integrated AIS provides up-to-the-minute inventory counts, as well as counts of units sold, and returns for use in a perpetual inventory system. One significant factor in the wide use of bar codes is that it is cost effective to maintain such a system. Also, both vendor and suppliers can read bar codes, and certain bar code formats are universal in nature. This allows goods to be sold virtually anywhere in the world, allowing for easier global marketing efforts to be made by businesses. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 CH 13 MULTIPLE CHOICE 1. The AIS compiles and feeds information among the business cycles. What is the relationship between the revenue and production cycles regarding the exchange of information? a) The revenue cycle provides sales forecast and customer order information to the production cycle, but the production cycle sends information back to revenue about finished goods production. b) The revenue cycle receives information from the production cycle about raw materials needs. c) The production cycle sends cost of goods manufactured information back to the revenue cycle. d) The production cycle does not exchange information with the revenue cycle. 2. Whether a company uses an AIS, ERP, or incorporates some degree of CIM into its production process, it still needs to collect data about four basic facets of its production operations. The facet that impacts the company's human resource cycle the most is a) b) c) d) the amount of raw material used in a production order. the labor hours expended to complete a production order. the machine operations performed during a production order. the tracking of manufacturing overhead costs incurred for a production order. 3. An AIS should be designed to provide timely and accurate information about production cycle activities that impact the other business cycles. One type of information deals with planning and controlling manufacturing costs and evaluating performance. This type of information is called a) b) c) d) product mix. product pricing. resource allocation. cost management. 4. The basic activities in the production cycle are a) b) c) d) product design and production operations. planning, scheduling, and cost accounting. raw materials requisitioning, planning, and scheduling. Both A and B are correct. 5. The first step in the production cycle is product design. There are several objectives connected with this step. Which objective below is not a product design objective? a) b) c) d) to design a product that meets customer requirements to design a quality product to minimize production costs to make the design easy to track for cost accounting purposes 6. The bill of materials shows the __________ of each product component. a) b) c) d) part number and description quantity used quantity ordered both A and B 7. The operations list shows Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) the labor and machine requirements. the steps and operations in the production cycle. the time expected to complete each step or operation. all of the above 8. The list which specifies the labor and machine requirements needed to manufacture a product is called the a) b) c) d) bill of materials. bill of lading. master production schedule. operations list. 9. The second step in the production cycle is planning and scheduling. One of the methods of production planning is referred to as push manufacturing. This method is also known as a) b) c) d) manufacturing resource planning (MRP). just-in-time manufacturing system (JIT). the economic order quantity (EOQ) system. ahead-of-time production implementation (ATPI). 10. The second step in the production cycle is planning and scheduling. One of the methods of production planning is referred to as pull manufacturing. This method is also known as a) b) c) d) manufacturing resource planning (MRP). just-in-time manufacturing system (JIT). the economic order quantity (EOQ) system. ahead-of-time production implementation (ATPI). 11. MRP-II and JIT manufacturing systems both plan production in advance. What is the main difference between these two systems? a) b) c) d) the length of the planning horizon JIT uses long-term customer demand for planning purposes MRP-II relies on EDI There are no differences between the two systems. 12. A master production schedule is used to a) b) c) d) develop detailed timetables of daily production and determine raw material purchasing. develop detailed reports on daily production and material usage. develop daily direct labor needs. develop detailed inventory charts. 13. The form in the production cycle that specifies how much of each product is to be produced during the planning period and when product should begin is the a) b) c) d) bill of materials. bill of lading. master production schedule. operations list. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 14. The production planning department develops the master production schedule based on information from several sources. What information is necessary to create this schedule? a) b) c) d) engineering department specifications and inventory levels engineering department specifications and sales forecasts special orders information and engineering department specifications sales forecasts, special orders information, and inventory levels 15. What document authorizes the manufacturing of a product? a) b) c) d) master production schedule materials requisition move ticket production order 16. A __________ authorizes the transfer of raw goods needed for production from the storeroom to the production facilities. a) b) c) d) master production schedule materials requisition move ticket production order 17. The document that authorizes the removal of the necessary quantity of raw materials from storeroom to factory is referred to as a) b) c) d) a bill of materials. a production order. a materials requisition. a move ticket. 18. Information found on the materials requisition form is based in part on information obtained from which other form? a) b) c) d) a bill of materials. a move ticket. a production order. a picking list. 19. A __________ is used to document the subsequent relocation of materials through the factory for manufacturing in process. a) b) c) d) master production schedule materials requisition move ticket production order 20. An integral part of the production process is the use of raw materials. One way to enable an AIS to efficiently track and process information about raw materials used in production is to implement __________. a) b) c) d) a just-in-time inventory system bar coding a materials resources planning inventory system job-order costing Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 21. The use of various forms of information technology in the production process is referred to as a) b) c) d) computerized investments and machines. computerized integration of machines. computer-integrated manufacturing. computer intense manufacturing. 22. The accountant's role in the __________ step of production cycle activities is to understand how CIM affects the AIS. a) b) c) d) production operations product design planning and scheduling cost accounting methods 23. A company's production process may incorporate various forms of information technology such as robots and computer-controlled machinery. One effect of using such a process is a shift from mass production to custom order manufacturing. This process is called a) b) c) d) ERP. CRM. AIS. CIM. 24. The final step in the production cycle is the cost accounting function. There are several principal objectives of the cost accounting system. Which objective listed below is not a principal cost accounting objective? a) to provide information for planning, controlling, and evaluating the performance of production operations b) to provide cost data about products used in pricing and product mix decisions c) to collect and process the information used to calculate inventory and cost of goods sold amounts that appear in the financial statements d) to provide tests of audit control functions as part of the AIS 25. Factory supervisory costs would be assigned to departments for a) b) c) d) product-mix decisions. pricing decisions. performance evaluation purposes. All of the above are correct. 26. Which of the following is not a type of cost accounting system? a) b) c) d) activity-based costing just-in-time costing job order costing process costing 27. The type of cost accounting system that primarily assigns costs to specific batches, or jobs, and is used where production items can be discretely identified is known as __________ cost accounting. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) just-in-time process job-order manufacturing resources 28. Which type of information below should not be maintained by the AIS in accounting for fixed assets? a) b) c) d) identification/serial number cost improvements market value 29. There are four basic activities in the production cycle. The step that may incorporate robots and computer-controlled machinery to achieve its goals is a) b) c) d) product design. planning and scheduling. production operations. cost accounting. 30. Job-time tickets are used to a) b) c) d) specify each production task. collect the time spent by a worker on a specific task. allocate machine costs. All of the above are correct. 31. Direct labor must be tracked and accounted for as part of the production process. Traditionally, direct labor was tracked using __________ but an AIS enhancement is to use __________ to record and track direct labor costs. a) b) c) d) job-time tickets; coded identification cards move tickets; coded identification cards employee earnings records; job-time tickets time cards; electronic time entry terminals 32. Manufacturing overhead consists of all manufacturing costs that are not economically feasible to trace directly to specific jobs or processes. Which of the costs below would not be considered an overhead cost? a) b) c) d) utilities rent earnings of factory production employees salaries of factory production supervisors 33. Detailed data about warranty and repair costs is considered an applicable control used to mitigate the threat of a) b) c) d) underproduction. overproduction. poor product design. suboptimal investment of fixed assets. 34. For replacement of inventories and assets destroyed by fire or other disasters, an organization needs Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) stand-by facilities. adequate insurance coverage. source data automation. All of the above are correct. 35. Overproduction or underproduction can be a threat to an organization. To which process or activity does this threat relate? a) b) c) d) product design planning and scheduling production operations cost accounting 36. Inaccurate recording and processing of production activities can diminish the overall effectiveness of production operations. One of the application controls that can help to ensure accounting records are accurate is to restrict the rights of authorized users only to the portion of the database needed to complete job duties. What specific control can help achieve this objective? a) b) c) d) an access control matrix passwords and user IDs closed-loop verification bar-code scanners 37. To curtail the threat of theft or destruction of inventories and other fixed assets, the organization may wish to implement which of the following controls? a) b) c) d) review and approval of fixed asset acquisitions improved and timelier reporting better production and planning systems document all movement of inventory through the production process 38. The best control procedure for accurate data entry is a) b) c) d) the use of on-line terminals. an access control matrix. passwords and user IDs. the automation of data collection. 39. The general threat of the loss of production data can greatly slow or halt production activity within an organization. To counteract such a major threat, which of the following organization controls should be implemented and maintained? a) b) c) d) store key master inventory and production order files on-site only to prevent their theft back up data files only after a production run has been physically completed access controls should apply to all terminals within the organization allow access to inventory records from any terminal within the organization to provide efficient data entry 40. The threat of loss of data exposes the company to a) b) c) d) the loss of assets. ineffective decision making. inefficient manufacturing. All of the above are correct. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 41. Activity-based costing (ABC) can refine and improve cost allocations using either job-order or process cost systems. There are three significant differences between ABC and traditional cost accounting approaches. One difference between the two systems is how clearly the results of management activities are measured on overall profitability. This benefit is better known as a) b) c) d) batch related overhead. improved cost management. product related overhead. improved cost drivers. 42. There are several criticisms of traditional cost accounting systems. One criticism is that the traditional cost system uses a volume-driven base, such as direct labor or machine hours, to apply overhead to products. What is the drawback to the use of such a measurement in a traditional cost accounting system? a) b) c) d) The cost accountant may not fully understand how to track direct labor or machine hours. It is difficult for an AIS to incorporate such a measurement into its system. It is difficult for an ERP to incorporate such a measurement into its integrated system. Many overhead costs are incorrectly allocated to products since they do not vary with production volume. 43. __________ links costs to the corporation's strategy for production of goods and services. a) b) c) d) Activity-based costing Job-order costing Process costing Manufacturing costing 44. Activity-based costing (ABC) can refine and improve cost allocations using either job-order or process cost systems. There are three significant differences between ABC and traditional cost accounting approaches. An ABC system attempts to identify anything that has a cause-and-effect relationship on costs. This cause-andeffect relationship is known as a a) b) c) d) cost stimulator. overhead stimulator. cost driver. cost catalyst. 45. What may be perceived as a drawback of using an activity-based costing (ABC) system? a) b) c) d) The ABC system may provide more accurate data results. The ABC system may help to establish a better product mix. The ABC system may improve management's ability to control total costs. The ABC may cost more to run and be more complex in nature. 46. Throughput is a measure of a) b) c) d) production yield. production effectiveness. production capacity. production quality. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 47. Quality control problems and inefficiencies in production operations will most likely result in increased expenses. The AIS can produce a measure of throughput to quantify and measure the number of "good" units produced in a time period. What does the first term in the throughput formula, productive capacity, represent? a) b) c) d) the maximum number of units that can be produced given current technology the percentage of total production time used to manufacture a product the percentage of "good" units produced given current technology the percentage of "bad" units produced given current technology 48. __________ are incurred to ensure that products are created without defects the first time. a) b) c) d) External failure costs Inspection costs Internal failure costs Prevention costs 49. __________ are associated with testing to ensure that products meet quality standards. a) b) c) d) External failure costs Inspection costs Internal failure costs Prevention costs 50. __________ represent testing to identify defective units before they are ready for sale. a) b) c) d) External failure costs Inspection costs Internal failure costs Prevention costs 51. There are various costs associated with quality control, or its absence in a production operation. Such information can help a company determine the effects of actions taken to improve production and identify areas of improvement. The cost of a product liability claim can be classified as a(n) a) b) c) d) prevention cost. inspection cost. internal failure cost. external failure cost. SHORT ANSWER 52. What is the production cycle. 53. What are the basic activities in a production cycle? 54. Identify and discuss the two documents that are the result of product design activities. 55. What is a master production schedule (MPS)? 56. Define the following: production order, materials requisition, and move ticket. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 57. What is CIM? 58. Explain the difference between job-order and process costing. 59. What types of data are accumulated by cost accounting? What is the accountant's role in this phase? ESSAY 60. What role does the AIS play in the production cycle? 61. Discuss the role the accountant can play in the production cycle. 62. Identify and briefly discuss the two common methods of production planning. 63. What are the two major types of cost accounting systems and what are the differences between the two? 64. Describe five threats to the production cycle and the applicable control procedures used to mitigate each threat. 65. Discuss two measures that can address the threats of inefficiencies and quality controls problems. 66. Discuss the criticisms of traditional cost accounting methods. 67. What is activity-based costing (ABC)? How does it compare with the traditional costing methods? What are the benefits of activity-based costing? ANSWER KEY 1) A 2) B 3) D 4) D 5) D 6) D 7) D 8) D 9) A 10) B 11) A 12) A 13) C 14) D 15) D 16) B 17) C 18) A 19) C 20) B 21) C 22) A 23) D 24) D 25) C 26) B 27) C Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 28) 29) 30) 31) 32) 33) 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) 55) 56) 57) 58) 59) 60) D C B A C C B B A D D C D B D A C B B A D B C D The production cycle is a recurring set of business activities and related data processing operations associated with the manufacture of products. There are four basic activities in the production cycle: product design, planning and scheduling, production operations, and cost accounting. The two documents that are the result of product design activity are the bill of materials and the operations list. The bill of materials specifies the part number, description, and quantity of each component used in a finished product. The operations list specifies the labor and machine requirements needed to manufacture the product. The operations list is sometimes also called a routing sheet, since it indicates how a product moves through the factory. A master production schedule (MPS) specifies how much of each product should be produced during the planning period and when the production should occur. It is used to develop a detailed timetable for daily production. A production order authorizes the manufacture of a specified quantity of a particular product. It contains information about the operation to be performed, quantity to be produced, and delivery location. A materials requisition authorizes the removal of raw materials from storeroom to the production floor. This document contains the production order number, date of issue, and, based on the bill of materials, the part numbers and quantities of all necessary raw materials. Raw material movement through the factory is documented on the move ticket, which identifies the parts being transferred, the locations to which they are transferred, and time of the transfer. CIM is the acronym that stands for computer integrated manufacturing. It incorporates various forms of information technology in the production process such as the use of robots and computercontrolled machinery. The benefit of CIM is that it can significantly reduce production costs. Job-order costing assigns costs to specific production batches or jobs. It is used whenever the product or service being sold can be distinctly identified. Process costing assigns costs to each process, or work center, and then calculates the average cost for all units produced. It is used whenever similar goods or services are produced in mass quantities. There are three types of cost data accumulated in a cost accounting system: raw materials; direct labor; and, manufacturing overhead. The role of the accountant is to control costs by assessing how product mix changes affect total manufacturing overhead and by identifying factors that drive changes in costs. Ac a AIS ays a vital role in the production cycle. Accurate and timely cost accounting information is essential input to decisions about the following: Product mix (what to produce), Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 61) 62) 63) 64) 65) Product pricing, Resource allocation and planning (e.g., whether to make or buy a product, relative profitability of different products), Cost management (planning and controlling manufacturing costs, evaluating performance). These decisions require much more detailed information about costs than the data needed to prepare financial statements in accordance with generally accepted acc c e (GAAP). T , e de fac a d c c c e AIS beyond merely meeting external financial reporting requirements. The accountant can play a role and provide meaningful input into each area of the production cycle. Accountants should participate in product design since 65 to 80% of product costs are determined at this stage of the production process. Accountant analysis of cost behavior and variations in product design can prove invaluable to the organization in this stage of production. In the planning and scheduling stage, accountants can help a company choose whether MRP-II or JIT is more appropriate for planning and scheduling. The accountant also should verify that the AIS collects and reports costs in a manner consistent with the production planning techniques it has chosen to use. In production operations, the accountant should develop a working knowledge of CIM in order to understand its effect on the AIS. The accountant will also be integrally involved with the cost accounting system, whether it is a traditional cost accounting system or an activity-based cost accounting system. Accountants can provide excellent insight into the cost aspect of the production process, which is key to the profitability and success of the organization. The two common methods of production planning are manufacturing resource planning (MRP-II) and just-in-time (JIT) manufacturing. MRP-II is an extension of the MRP inventory control system. MRP-II seeks to balance the existing production capacity and raw materials required to meet forecasted sales demand. JIT manufacturing seeks to minimize or eliminate inventories of raw materials, work in process, and finished goods. A JIT manufacturing system only produces a product in response to customer demands. MRP-II systems are referred to as push manufacturing, since products are made in expectation of customer demand. JIT systems are called pull manufacturing systems, since goods are produced only in response to customer demands. Most companies will use either job-order or process costing to assign production costs in the production of products. Job-order costing is designed to assign costs to specific production batches, or jobs (hence the name "job-order"). It is used in a production process where a product is specifically, discreetly identifiable (such as a custom-built home or office building). It should be noted that job-order costing can also be successfully used in the service sector by law or accounting firms to calculate and track the costs incurred in legal cases and audits, respectively. Process costing differs in that it assigns costs to each process, or work center, in the production cycle, and then averages these costs across the number of units produced. Process costing is useful whenever similar or homogenous goods are produced in mass quantities, such as laundry detergent, some types of food items, or soft drinks. Costs can be assigned at each stage in the production process for these items, and then an average total unit cost for the product can be calculated based on output. Process costing has also been incorporated by mutual funds to find the average cost of handling customer deposits and withdrawals. Threat 1: Unauthorized transactions - Controls: Accurate sales forecasts, maintaining accurate inventory records; authorizing production; restricting access to the production planning program; and review and approval of capital expenditures 2: Theft or destruction of inventories and fixed assets - Controls: Restrict physical access to inventories; document internal physical flow of assets; proper segregation of duties; periodic physical count and reconciliation of inventory; document and authorize materials requests and disposal of fixed assets; and have adequate insurance 3: Recording and posting errors - Controls: Automate data collection procedures; online data entry edit controls; and conduct periodic physical inventory and fixed asset counts 4: Loss of data - Controls: Regularly back up files; keep additional master files; use internal and external file labels; restrict access; and keep logs of all activities 5: Inefficiencies and quality control problems - Controls: Prepare regular performance reports; highlight exception reports and variances; compare actual performance to budgeted performance; measure throughput; and measure the cost of quality control Throughput represents the number of good (nondefective) units produced in a given period of time. It consists of three factors, (productive capacity, productive processing time, and yield), each of which can be separately controlled as shown in the formula: Throughput = (total units Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 produced/processing time) x (processing time/total time) x (good units/total units). Knowing about quality costs can help companies determine the effects of actions taken to improve yield and identify areas for further improvement. The main objective of quality control is to minimize the sum of the four types of costs recognizing the trade-offs between costs. These costs are: prevention costs, inspection costs, internal failure costs, and external failure costs. 66) There can be an inappropriate allocation of overhead costs. The factors contributing to this problem are: A volume-driven form used for activity-driven overhead costs assigned to products. Overhead cost is either over- or understated due to allocation method used. The system may distort costs across products, especially if manufacturing is highly automated can be inaccurate performance measures which do not accurately reflect the effects of factory automation: Measures collected are not integrated with performance measures. Lack of information about standard costs, variance, and functioning of production process. Lack of information about defect rates, breakdown frequency, percentage for finished goods completed without rework, etc. 67) Activity-based costing (ABC) traces costs to the activities that created them and then allocates those costs to products or shipments thereby linking the costs to a corporate strategy. ABC versus traditional cost systems: ABC attempts to directly trace most costs to products, ABC uses more cost pools to accumulate manufacturing overhead instead of lumping all overhead costs together as in the traditional approach. For example: 1) Batch-related overhead results in larger quantities having lower batch-related costs than smaller quantities; 2) Product-related overhead results in costs being allocated to only the product(s) that are linked to the cost; and 3) Company-wide overhead results in such overhead costs (e.g., rent) being allocated based on department or plant rates. ABC uses cost drivers that have a cause-and-effect relationship on the products in order to allocate the costs instead of using the traditional financial variables. Advantages of ABC systems: Better decisions because can be made with an ABC system because product cost data is more accurate and data is used to improve product design. Improved cost management is seen due to four reasons: 1) There are clearer measures of managerial actions on profitability. 2) The consumption of resources is measured in addition to the amount spent on acquiring resources. 3) The cost of activity capability = Cost of activity used + Cost of unused capacity. 4) Performance reports help direct managerial attention to the effect of policy decision on all costs. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 13 MULTIPLE CHOICE 1. Which activity below is not performed by the HRM? a) b) c) d) compensation training discharge recruitment and hiring 2. In most companies the HRM/payroll cycle activities are accomplished by two separate systems. Which task below is typically not performed by an HRM system? a) b) c) d) training performance evaluation compensation recruiting and hiring of new employees 3. What is the payroll system's principal output? a) b) c) d) hiring information checks to employees checks to government agencies internal and external use reports 4. Which area provides information to the system about hiring, terminations, and pay rate changes? a) b) c) d) payroll timekeeping purchasing HRM 5. Which of the following is not one of the major sources of input to the payroll system? a) b) c) d) payroll changes time and attendance data checks for insurance and benefits withholdings and deduction requests from employees 6. In the payroll system, checks are issued to a) b) c) d) employees and to banks participating in direct deposit. a separate payroll bank account. government agencies. All of the above are correct. 7. Some companies have created a position called "director of intellectual assets." What is the objective of this position? a) measurement and development of intellectual assets and human resources Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) implementation of a more integrated HRM/payroll system c) improvement of the hiring and firing procedures in the company d) All of the above are correct. 8. Some stock analysts believe that a company's human resources may be worth several times the value of its tangible assets. However, the AIS typically does not account for or track such assets. Why is this the case? a) Employees are not "owned" by the company, and may not be considered an asset. b) Financial statements report on assets that have not yet been used by the organization. c) The value of human resources is only acknowledged when used and is tracked as an expenditure and not an asset. d) all of the above 9. Employee turnover will always occur and some experts believe it may even be desirable in an organization. Experts estimate that on average the costs associated with replacing an employee are about __________ that of the employee's annual salary. a) b) c) d) one-quarter one-half one and one-half twice 10. Payroll is one AIS application that is processed in __________ mode. a) b) c) d) sequential batch real time safe 11. The first step in the payroll process is to a) b) c) d) calculate gross pay. update the payroll master file. input time card data. print paychecks. 12. The payroll master file is updated with a) b) c) d) new hire and termination data. changes in pay rates and discretionary withholdings. changes in time card data. A and B above are correct. 13. When a person quits or is terminated from a company, what should be done with the person's record in the payroll system? a) It should be deleted immediately to prevent bogus paychecks from being issued. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) It should be kept indefinitely. c) It needs to be kept at least until the end of the current year. d) There is no rule about the retention of payroll records. 14. Given the four activities below, which of the HRM/payroll cycle activities occurs infrequently relative to the others? a) b) c) d) updating of the payroll master file updating information about tax rates and withholdings validating each employee's time and attendance data preparing payroll 15. Time cards are generally used for employees who are paid on a(n) a) b) c) d) monthly basis. overtime basis. hourly basis. production or piece-rate basis. 16. For recording time spent on specific work projects, manufacturing companies usually use a a) b) c) d) job time ticket. time card. time clock. labor time card. 17. Which category of employee below is least likely to use a time card or electronic time clock to track their hours? a) b) c) d) employees who manufacture a product accountants attorneys managers and professional staff 18. Regarding the use of incentives, commissions and bonuses in payroll, which of the following statements is false? a) Using incentives, commissions, and bonuses requires linking the payroll system and the information systems of sales and other cycles in order to collect the data used to calculate bonuses. b) Bonus/incentive schemes must be properly designed with realistic, attainable goals that can be objectively measured. c) Poorly designed incentive schemes can result in undesirable behavior. d) All of the above are true 19. Many companies use incentives and bonuses to motivate greater productivity and better quality work. An effective bonus/incentive system should incorporate realistic, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 attainable goals that can be objectively measured. What is not a desired result of an employee bonus/incentive system? a) employees may recommend unnecessary services to customers in order to exceed set sales quotas and earn a bonus b) employees may look for ways to improve service c) employees may analyze their work environment and find ways to cut costs d) employees may work harder and may be more motivated to exceed target goals to earn a bonus 20. Which of the following is most likely to be a daily activity in the HRM/Payroll system? a) b) c) d) Approve payroll disbursement Prepare paychecks Sign payroll checks Update HRM/Payroll database 21. A manufacturing company is likely to use __________ to collect employee time data for payroll and job time. a) b) c) d) badge readers supervisor's entries preprinted time cards retina scanning 22. These are used to transmit time and attendance data directly to the payroll processing system. a) Badge readers b) Electronic time clocks c) Magnetic cards d) None of the above 23. Payroll deductions fall into the broad categories of __________ and __________. a) b) c) d) payroll tax withholdings; voluntary deductions unemployment; social security taxes unemployment taxes; income taxes voluntary deductions; income taxes 24. Which of the following deductions is not classified as a voluntary deduction? a) b) c) d) pension plan contributions social security withholdings insurance premiums deductions for a charity organization 25. Which type of payroll report contains information such as the employees' gross pay, payroll deductions, and net pay in a multicolumn format? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) payroll register deduction register employee earnings statement federal W-4 form 26. Which type of payroll report lists the miscellaneous voluntary deductions for each employee? a) b) c) d) payroll register deduction register earnings statement federal W-4 form 27. Which type of payroll report includes the details of the current paycheck and deductions as well as year-to-date totals for each category? a) b) c) d) payroll register deduction register earnings statement federal W-4 form 28. Which HR report is used in preparing labor-related reports for government agencies? a) b) c) d) payroll register deduction register skills inventory workforce inventory 29. Which HR report is useful in planning future workforce needs and training programs? a) payroll register b) deduction register c) skills inventory report d) workforce inventory 30. Which HR report is sent to each employee for use in preparing individual tax returns? a) Form 941 b) Form W-2 c) Form W-4 d) Form 1099 31. Why is a separate payroll account used to clear payroll checks? a) for internal control purposes to help limit any exposure to loss by the company b) to make bank reconciliation easier c) banks don't like to commingle payroll and expense checks d) All of the above are correct. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 32. One good way to eliminate paper paychecks is to a) b) c) d) pay in cash only. pay with money orders. use the direct deposit method to transfer funds into employee bank accounts. use EFT. 33. What step can be taken to reduce the distribution of fraudulent paychecks? a) b) c) d) have internal audit investigate unclaimed paychecks allow department managers to investigate unclaimed paychecks immediately mark "void" across all unclaimed paychecks match up all paychecks with time cards 34. This organization maintains the payroll master file for each of its clients and performs the payroll process. a) b) c) d) Cashier Payroll service bureau Professional employer organization Virtual private network 35. This organization provides payroll as well as other HRM services such as employee benefit design and administration. a) b) c) d) Cashier Payroll service bureau Professional employer organization Virtual private network 36. Which of the following is not a benefit of using a payroll service bureau or a professional employer organization? a) b) c) d) Freeing up of computer resources Increased internal control Reduced costs Wider range of benefits 37. Many companies offer their employees a "cafeteria" approach to voluntary benefits in which employees can pick and choose the benefits they want. This approach is normally called a(n) a) b) c) d) elective plan. menu options benefit plan. flexible benefit plan. pay-as-you-go plan. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 38. The fourth step in the payroll cycle is preparing payroll. Pay rate information is needed in order to complete this task. The pay rate information is accessed by the system from __________. a) b) c) d) the employees' personnel files the employee subsidiary ledger the payroll master file electronic time cards 39. Part of the calculation necessary to process a payroll involves summing payroll deductions and subtracting the total from an employee's gross pay to arrive at net pay. Payroll deductions fall into two broad categories. Which deduction below would not be considered a voluntary deduction? a) b) c) d) disability insurance pension plan contribution union dues social security taxes 40. In a batch system, the payroll transaction file would contain a) b) c) d) entries to add new hires. time card data. changes in tax rates. All of the above are correct. 41. One step in the payroll cycle is the preparation of paychecks. In the next step the payroll register is sent to accounts payable for review. What is the following step in the process? a) The paychecks are distributed to the employees. b) A disbursement voucher is prepared to authorize the transfer of funds from the compan s general account. c) The payroll taxes are computed. d) The earnings statements are printed. 42. The document that lists each employee's gross pay, payroll deductions, and net pay in a multicolumn format is called a) b) c) d) an employee earnings statement. the payroll register. a deduction register. an employee time sheet summary. 43. As the payroll system processes each payroll transaction, the system should also perform which activity listed below? a) allocate labor costs to appropriate general ledger accounts b) use cumulative totals generated from a payroll to create a summary journal entry to be posted to the general ledger Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) both A and B above d) The HRM system should not perform either activity A or B. 44. Direct deposit of employee paychecks is one way an organization can improve efficiency and reduce payroll-processing costs. Which statement regarding direct deposit is incorrect? a) The cashier does not have to authorize the transfer of funds from the organization's checking account to a payroll checking account. b) The cashier does not have to sign employee paychecks. c) Employees who are part of a direct deposit program receive a copy of their paycheck indicating the amount deposited. d) Employees who are part of a direct deposit program receive an employee earnings statement. 45. Many demands are placed on the company's HRM/payroll system. For example, federal and state laws require employers to contribute a specified percentage of each employee's gross pay into certain funds. Such funds are used for a) b) c) d) social security taxes. flexible benefit plans. federal and state unemployment compensation funds. federal income taxes. 46. The employer pays a portion of some payroll taxes and employee benefits. Both the employee and employer pay which benefit or tax listed below? a) b) c) d) social security taxes federal income taxes state income taxes none of the above 47. Some organizations outsource their payroll and/or HRM functions in an effort to reduce costs. A third party that maintains the payroll master file for each of its clients and processes payroll for them is called a) b) c) d) a professional employer organization (PEO). a payroll service bureau. a value-added network. an electronic data interface. 48. When using electronic documents, __________ increase the accuracy of data entry. a) b) c) d) access controls separation of duties general controls application controls 49. The key to preventing unauthorized changes to the payroll master file is Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) hiring totally honest people to access and make changes to this file. b) segregating duties between the preparation of paychecks and their distribution. c) segregation of duties between the authorization of changes and the physical handling of paychecks. d) having the controller closely review and then approve any changes to the master file. 50. Which of the following is not a potential effect of inaccurate time data? a) b) c) d) increased labor expenses erroneous labor expense reports damaged employee morale inaccurate calculation of overhead costs 51. Which control would be most appropriate to address the problem of inaccurate payroll processing? a) b) c) d) encryption direct deposit cross-footing of the payroll register an imprest payroll checking account 52. What is the purpose of a general ledger payroll clearing account? a) to check the accuracy and completeness of payroll recording and its allocation to cost centers b) to make the bank reconciliation easier c) to make sure that all employees are paid correctly each week d) to prevent the cashier from having complete control of the payroll cycle 53. A "zero balance check" refers to which of the following control procedures? a) b) c) d) batch totals cross-footing the payroll register a payroll clearing account online edit control 54. Which of the following controls is inappropriate for payroll check writing? a) restrict access to blank payroll checks and documents b) use of a payroll clearing account c) someone independent of the payroll process should reconcile the payroll bank account d) sequential numbering of paychecks and accounting for the numbers 55. What is the best control to reduce the risk of losing payroll data? a) passwords b) physical security controls c) backup and disaster recovery procedures Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) encryption 56. One threat to the HRM/payroll cycle is the potential for violation of employment laws. This threat relates directly to the process or activity of a) b) c) d) payroll processing. general activities found in the cycle. hiring and recruiting. none of the above 57. What is a potential threat to the activity of payroll processing? a) b) c) d) hiring unqualified employees poor system performance violations of employment laws unauthorized changes to the payroll master file 58. The results of an internal audit finds that there is a problem with inaccurate time data being entered into the payroll system. What is an applicable control that can help prevent this event from occurring in the future? a) b) c) d) proper segregation of duties automation of data collection sound hiring procedures review of appropriate performance metrics 59. Theft or fraudulent distribution of payroll checks is a potential threat to the payroll processing activity. What is one control that can be implemented to help prevent paychecks being issued to a "phantom" or "ghost" employee? a) b) c) d) the cashier should sign all payroll checks prenumber all payroll checks use an imprest account to clear payroll checks paychecks should be physically distributed by someone who does not authorize or record payroll SHORT ANSWER 60. Define an HRM/payroll cycle. What are the basic activities in an HRM/payroll cycle? 61. List the various ways used to compensate employees. 62. What are different types of deductions in payroll? 63. Why are accurate cumulative earnings records important? 64. Explain the functions of the payroll register, deduction register, and earnings statement. 65. What is a payroll service bureau? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 66. What is a professional employer organization? 67. Discuss the various types of input into an AIS HRM/payroll system. 68. What are some of the benefits of using incentives and bonuses? What are some dangers? 69. Name some of the benefits of using electronic direct deposit to pay employees. ESSAY 70. What is the role of "soft assets" in the new information economy? Why has an AIS not reported on the company's human resources? 71. What factors should be considered in outsourcing payroll to a payroll service bureau? Discuss the advantages and disadvantages of using a payroll service bureau to process a payroll. 72. What are the control objectives in an HRM/payroll cycle? 73. Discuss the threat of unauthorized changes to the payroll master file and its consequences. 74. What controls are available to address the threat of payroll errors? ANSWER KEY 1. A 2. C 3. B 4. D 5. C 6. D 7. A 8. D 9. C 10. B 11. B 12. D 13. C 14. B 15. C 16. A 17. D 18. D 19. A 20. D 21. A Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 22. B 23. A 24. B 25. A 26. B 27. C 28. D 29. C 30. B 31. A 32. C 33. A 34. B 35. C 36. B 37. C 38. C 39. D 40. B 41. B 42. B 43. C 44. A 45. C 46. A 47. B 48. D 49. C 50. D 51. C 52. A 53. C 54. B 55. C 56. C 57. D 58. B 59. D 60. The HRM/payroll cycle is a recurring set of business activities and related data processing operations associated with effectively managing the employee work force. Important activities in the HRM/payroll cycle include the following tasks: Recruitment and hiring of new employees. Training. Job assignment. Compensation (payroll). Performance evaluation. Discharge. 61. Hourly rate; Piece rate (based on some form of production activity); Fixed salary; Commission based on sales or some quantitative measure; Salary plus commission; Bonus incentives; stock options. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 62. Payroll deductions include: Payroll tax withholdings such as federal, state, and local income taxes social security taxes, unemployment taxes; Voluntary deductions such as contributions to a pension plan, premium for group life, etc. 63. Accurate records of cumulative earnings are necessary because social security and other deductions have maximum earnings amounts upon which taxes are paid; and the appropriate amount of income and payroll taxes should be remitted to the government agencies. 64. The payroll register is a report that lists each employee's gross pay, payroll deductions, and net pay for each pay period. The deduction register lists the voluntary deductions for each employee. The earnings statement lists the amount of gross pay, deductions, and net pay for the current period, as well as providing year-to-date totals. 65. A payroll service bureau is a company that can be hired as an independent contractor to maintain the payroll master file and perform the payroll processing activities for an organization. 66. A professional employer organization is a company that provides not only full payroll services but also provides HRM services such as employee benefit design and administration. 67. An HRM/payroll system relies on input from various sources. Employees provide input when they make changes in their discretionary deductions (contributions to charities or retirement plans); various departments provide data about the actual hours employees work. The HRM department provides information about employees who have been hired or terminated, pay-rate changes, and promotions. Government agencies provide tax rates and various instructions for meeting regulatory requirements. Insurance companies and other organizations provide instructions for calculating and remitting various withholding amounts. 68. Sales staffs are often paid either on a straight commission basis or a combination of a salary plus commissions. This is done to keep sales at a certain level or to increase sales. The HRM/payroll system will need input from the sales and other cycles to properly calculate commissions and bonuses for such employees. It is important that an incentive and bonus system sets realistic, attainable goals that are congruent with corporate objectives. It is also important that managers monitor incentive and bonus goals and ensure that the attainment of such goals is appropriate for the organization and does not lead to undesirable behavior, which can result from poorly designed incentive schemes. 69. Direct deposit of paychecks provide a savings to employers because the costs of purchasing, processing, and distributing paper checks is eliminated. Using direct deposit also reduces postage and bank fees. The cashier's time can be better spent because paychecks do not have to be signed. Employees save time as well as they do not have to make a physical trip to the bank to cash their checks. Direct deposit is safer as it eliminates misplaced paychecks and reduces the possibility of the theft of checks. 70. Soft assets represent intangible employee skills and knowledge in the organization, whereas hard assets represent tangible assets like buildings, land, or machinery. Many established information technology companies like Microsoft Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 and new Internet companies like Amazon.com have relatively few hard assets (termed "bricks and mortar" in e-commerce). Their market value represents primarily the skills and knowledge of their employees. The accounting profession has traditionally ignored this "intellectual capital" due to problems with establishing objective valuation methods. Under GAAP, assets mean resources "owned" by an organization. Human resources, using this definition, are not assets since they are not "owned" by the company. Thus, salaries, bonuses, commissions, and direct labor are recorded by an AIS as expenses--there is no comprehensive review of measurement and reporting of human resources as assets. To help enable such measurement and establish value, an AIS should be integrated with the HRM system so employee costs and information about employee skills and knowledge can be readily accessed. 71. The following questions should be considered: How much does the service cost? How would the data be submitted-online or hand carried? What kind of reports and documents could be obtained from the service bureau? How would the service interface with the existing general ledger system? What resources are now being devoted to payroll and how could these resources be re-deployed into other areas? Could security and control be improved by the outsourcing? What would be the time length of a contract for outsourcing services? Could the service bureau system be integrated so that an online query could be made by the organization? What kind of track record does the service bureau have with other clients? Are there new technologies and approaches that would become available to the company via the service bureau? Advantages: No need to deal with complexity and changes in tax codes. No need to worry about what to do if equipment crashes. Less chance of employees accessing the payroll files (confidentiality). Possible efficiency and cost reductions. Wider range of benefits. Reed-up computer resources. Disadvantages: Less control over the payroll files because they are stored off-site. Extra costs for any special reports. Slower response to adhoc queries. 72. All payroll transactions are properly authorized. All recorded payroll transactions are valid. All valid, authorized payroll transactions are recorded. All payroll transactions are accurately recorded. Applicable government regulations regarding remittance of taxes and filing of payroll and HRM reports are met. Assets (both cash and data) are safeguarded from loss or theft. HRM/payroll cycle activities are performed efficiently and effectively. 73. Many problems may result when there are unauthorized changes to the payroll master file. Unauthorized changes may be made to employee pay rates, resulting in the company paying too much in wages. "Ghost" or "phantom" employees may be added to the payroll master to divert funds to dishonest employees through the issuance of paychecks to such "employees." Likewise, terminated employees may still be paid, resulting in the fraudulent diversion of payroll funds. Two controls that should be implemented and maintained to provide overall control of the payroll master file: proper segregation of duties and controlling access to the file. Good internal control dictates that only authorized HRM personnel be allowed to update the payroll master file for any hiring, termination, pay raise, and promotion. HRM personnel, who have such access to the payroll Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 master file, should never be allowed to directly participate in actual payroll processing or paycheck distribution. This way an adequate control is created to match actual paychecks (or earnings statements when direct deposit is in place) with employees when a manager, supervisor, or other third party hand out the checks (or earnings statements). Also, a different individual should approve all changes to the payroll master file in writing other than the individual who recommends or initiates the changes. User IDs and passwords should always be used to control access to the payroll master file, and an access control matrix should be established to define what actions each authorized employee is allowed to make and confirms the files the employee may access. 74. Three types of controls can be used to circumvent payroll errors in an HRM/payroll system. Batch totals are used to verify totals entered into the system both at the time of data entry and at each stage in the processing. Hash totals are particularly useful in this regard, since hash totals calculated at the time of original data entry and again at each stage in the process can be compared. When the comparisons match throughout the process, three conclusions can be made: 1) all payroll records have been processed; 2) the data input was accurate; and 3) no bogus time cards were entered at any point after initial input. Upon completion of a payroll, the payroll register should be cross-footed to verify that the totals of the net pay column and other deduction columns equal the total of the gross pay column. A third control is the use of a payroll clearing account. This is a general ledger account that can be used as part of a two-step accuracy and completeness process. First, the payroll control account will be debited for the amount of the gross pay for the pay period; cash and other various withholding liability accounts are credited. Second, the cost accounting process distributes labor costs to various expense categories and credits the payroll control account for the total amount of the debits made to the other accounts. The result is that the payroll control account will have a zero balance. This becomes an internal check known as a zero balance check, indicating that the proper postings have been made to all of the accounts associated with payroll for a given pay period. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 14 MULTIPLE CHOICE 1. The general ledger and reporting system consists of the __________ involved in __________ the general ledger and __________ reports. a) b) c) d) business transactions; updating; processing data processing; business transactions for; printing information processing; updating; creating business transactions; data processing; preparing 2. Which item below is not considered a major input to the general ledger and reporting system? a) b) c) d) summary entries from the major subsystems reports from managers adjusting entries financing and investing activities 3. Who provides the adjusting entries for a well-designed general ledger and reporting system? a) b) c) d) various user departments the treasurer's area the other major AIS subsystems the controller's area 4. The general ledger and reporting system is designed to provide information for which of the following user groups? a) b) c) d) internal users external users inquiry processing by internal or external users all of the above 5. The general ledger system of an organization should be designed to serve the information requirements of both financial and nonfinancial users. This means that the system should a) b) c) d) support producing regular periodic reports. support the real-time inquiry needs of all users. support producing regular periodic reports and respond to real-time inquiry needs. support access by investors and creditors of the organization to general ledger balances. 6. The first activity in the general ledger system is to update the general ledger. Updates come from the various accounting subsystems as well as from the treasurer. How is general ledger updating accomplished by the various accounting subsystems? a) Individual journal entries for each accounting subsystem transaction update the general ledger every 24 hours. b) Summary journal entries that represent the results of all transactions for a certain time period are used to update the general ledger. c) The controller or treasurer must approve accounting subsystem journal entries before any updating may occur. d) Nonroutine transactions are entered into the system by the treasurer's office. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7. When updating the general ledger, sales, purchases, and production are examples of __________ entries, and issuance or retirement of debt and the purchase or sale of investment securities are examples of __________ entries. a) b) c) d) adjusting; controller originated accounting subsystem; treasurer originated adjusting; special journal controller generated; special journal 8. Entries to update the general ledger are often documented by which of the following? a) b) c) d) general journal subsidiary journal subsidiary ledgers journal vouchers 9. In accounting terminology, the form that documents journal entry updates to the general ledger is called a) b) c) d) a trial balance. an adjusted trial balance. a journal voucher. an accounting update memo. 10. Adjusting entries that reflect events that have already occurred but for which no cash flow has taken place and not previously entered into the accounts are called a) b) c) d) accruals. deferrals. revaluations. corrections. 11. The recording of interest earned on an account balance or wages payable is an example of which type of adjusting journal entry? a) b) c) d) accrual entry deferral entry revaluation entry correcting entry 12. The posting of adjusting journal entries is the second activity found in the general ledger system. Adjusting entries fall into several categories. An adjusting entry made at the end of an accounting period that reflects the exchange of cash prior to performance of a related event is called a(n) a) b) c) d) accrual entry. deferral entry. revaluation entry. correcting entry. 13. Depreciation and bad debts expense are examples of which type of adjusting entries? a) deferrals b) accruals c) revaluations Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) estimates 14. Adjusting entries that are made to reflect differences between the actual and recorded value of an asset or a change in accounting principle are called a) b) c) d) reconciliations. revaluations. estimates. accruals. 15. Adjusting entries that are made to counteract the effects of errors found in the general ledger are called a) b) c) d) accruals. corrections. deferrals. estimates. 16. Corrections are entries made to correct errors found in __________. a) b) c) d) all journals. special journals. the general ledger. the financial statements. 17. Immediately after the adjusting entries are completed, the next step in the general ledger and reporting system is to prepare a) b) c) d) an adjusted trial balance. a closing entry. a worksheet. the statement of cash flows. 18. There are four basic activities performed in the general ledger and reporting system. Several of these activities represent the basic steps in the accounting cycle. In what step is the adjusted trial balance prepared? a) b) c) d) update the general ledger post adjusting entries prepare financial statements produce managerial reports 19. The preparation of financial statements is the third activity in the general ledger system. To properly complete the accounting cycle, financial statements are prepared in a certain sequence. Which statement is prepared last in the sequence? a) b) c) d) the adjusted trial balance the income statement the balance sheet the statement of cash flows 20. A listing of journal vouchers by numerical sequence, account number, or date is an example of a) a general ledger control report. b) a budget report. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) a batch to be processed. d) responsibility accounting. 21. The final activity in the general ledger and reporting system is the production of various managerial reports. The report that shows planned cash inflows and outflows for each project is the a) b) c) d) journal voucher list. statement of cash flows. operating budget. capital expenditures budget. 22. Various budgets can be produced for planning and evaluating performance within an organization. The operating budget a) b) c) d) compares estimated cash flows from operations with planned expenditures. shows cash inflows and outflows for each project. depicts planned revenues and expenditures for each organizational unit. is used for the purchase and retirement of property, plant, and equipment. 23. Budgets and performance reports should be developed on the basis of a) b) c) d) responsibility accounting. generally accepted accounting principles. financial accounting standards. managerial accounting standards. 24. Cost center reports compare actual versus budget regarding __________ costs. a) b) c) d) controllable noncontrollable fixed variable 25. Sales departments are most likely to be evaluated as ______ centers a) b) c) d) cost profit investment revenue 26. Departments that mostly provide services to other units and charge those units for services rendered should be viewed as __________ centers. a) b) c) d) cost profit investment revenue 27. Variances for variable costs will be misleading when the planned output differs from budgeted output. A solution to this problem would be a) b) c) d) calling all costs fixed. to use flexible budgeting. better prediction of output. to eliminate the budgeting process. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 28. Most budgets compare a standard budget amount to actual amounts that reflect the true performance of the organization. The budget standard is often a fixed target; however, given that these amounts are static, the budget does not account for unforeseen changes in the operating environment. A solution to this type of problem is to use a(n) a) b) c) d) operating budget. capital expenditures budget. cash flow budget. flexible budget. 29. Concerning the reporting environment, which of the following statements is not true? a) Many companies can submit required financial and tax fillings electronically to the SEC and IRS. b) Management reports are usually developed in spreadsheets and disseminated either through e-mail or by posting on the company intranet. c) For many companies, the electronic dissemination of reports containing financial information has been an efficient process for some time. d) Many companies post their financial statements on their corporate web sites. 30. Concerning XBRL, which of the following statements is not true? a) b) c) d) XBRL is a variant of XML. XBRL is specifically designed for use in communicating the content of financial data. XBRL creates unique tags for each data item. XBRL's adoption means accountants and systems professionals must know how to write XBRL code to take advantage of its benefits. 31. The benefits of XBRL include: a) XBRL enables organizations to publish financial information only once, using standard XBRL tags. b) XBRL tagged information is interpretable and doesn't need to be re-entered by users. c) Both are benefits of XBRL d) Neither are benefits of XBRL 32. Communications technology and the Internet can be used to reduce the time and costs involved in disseminating financial statement information. Users of such financial information still struggle in that many recipients have different information delivery requirements and may have to manually reenter the information into their own decision analysis tools. The ideal solution to solve these problems and efficiently transmit financial information via the Internet is to use a) b) c) d) HTML code. XML. the pdf file format. XBRL. 33. Which of the following would be an effective control for achieving the general control objectives in the general ledger and reporting system? a) b) c) d) using well-designed documents and records online data entry with the use of appropriate edit checks prenumbering documents and accounting for the sequence numbers All of the above are appropriate. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 34. A type of edit check that would ensure that entries are made to existing general ledger accounts is called a(n) __________ check. a) b) c) d) validity existence closed loop verification field 35. Journal entries made by either the treasurer or controller should be subject to input edit and processing controls. A check that can be made to ensure that the amount field in a journal entry contains only numeric data is called a __________. a) b) c) d) validity check field or format check zero-balance check sign check 36. One way of ensuring that recurring adjusting journal entries that are needed each month are in fact made each month would be a) b) c) d) to make all the entries a month in advance. to rotate the responsibility among the accounting staff. to program the entries to be made automatically. to create a standard adjusting journal entry file. 37. The edit check that verifies the ending balance of an account in fact fully reflects the beginning balance and all debit and credit entries made thereafter is referred to as a a) b) c) d) run-to-run total. completeness check. closed loop verification. zero balance check. 38. Reconciliation and control reports can help detect whether any errors have been made during the process of updating the general ledger. One reconciliation that indicates whether the sum of debit balances is equal to the sum of credit balances in the general ledger is commonly known as a) b) c) d) a trial balance. a completeness test. a closed-loop verification. a general journal listing. 39. This report indicates whether the total debits equal the total credits posted to the general ledger. a) b) c) d) a trial balance. a completeness test. a closed-loop verification. a general journal listing. 40. Which of the following tasks are accomplished by following the audit trail? a) trace a transaction from original source document to the general ledger to a report b) trace an item in a report back through the general ledger to the original source c) trace all changes in the general ledger from beginning to ending balances Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) All of the above are correct. 41. Which one of the following measures four dimensions of performance? a) b) c) d) human resources accounting social responsibility accounting a balanced scorecard integrated databases 42. A report containing measures that relate to the financial, internal operation, customer, and innovation and learning perspectives of an organization is called a(n) a) b) c) d) ERP. AIS. balanced scorecard. data warehouse. 43. Which one of the following dimensions provides measures on how efficiently and effectively the organization is performing key business processes? a) b) c) d) financial internal operations innovations and learning customer perspectives 44. To support the strategic decision-making requirements of organizations, a separate database may be created and maintained. The name used for such a database depends on its size. What is the smaller version of such a database called? a) b) c) d) a data warehouse a data mart a data store a database management system 45. A financial data warehouse provides support for strategic decision making because it a) b) c) d) consolidates current financial data. contains both current and historical financial data. contains current financial and operational data. summarizes historical data. 46. Which statement below about data warehouses and data marts is true? a) The typical size of a data warehouse is small. b) Data warehouses may replace the transaction processing databases of an organization. c) A data warehouse or data mart complements the other databases within the organization by providing support for strategic decision making. d) Data marts can be used for transaction processing. 47. The process of accessing the data contained in a data warehouse and using it for strategic decision making is often referred to as: a) b) c) d) artificial intelligence business intelligence data mart data warehousing Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 48. Which of the following techniques is not used in data mining? a) b) c) d) statistical analysis artificial intelligence expert systems neural networks 49. Which of the following is not one of the basic principles that make bar charts easy to read? a) b) c) d) Include data values with each element. Use 3-D rather than 2-D bars to make reading easier. Use colors or shades instead of patterns to represent different variables. Use titles that summarize the basic message. SHORT ANSWER 50. What is a general ledger and reporting system? 51. What are the four basic activities involved in the general ledger and reporting system? 52. What is a journal voucher file? What is the purpose of this file? 53. What is responsibility accounting? 54. How is a balanced scorecard used to assess organizational performance? 55. How is an audit trail used in the general ledger and reporting system? 56. Explain the benefits of XBRL. ESSAY 57. Discuss the value and role of budgets as managerial reports. 58. What is data mining? Give an example of how it is used. 59. What are the control objectives in the general ledger and reporting system? 60. Describe three threats in the general ledger and reporting system and identify corresponding controls for each threat. 61. Explain the preparation of financial statements as the third step in the general ledger and reporting system. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. C B D D C B B D C A A B D B B C A B D A D C A A D B B D C D C D D A B D A A D D C C B B B C B C B A general ledger and reporting system consists of the information processing operations involved in updating the general ledger and preparing reports that summarize the results of activities for both external and internal users. The information contained in the general ledger is also part of the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 preparation of financial statements. 51. Update general ledger. Post adjusting entries. Prepare financial statements. Produce managerial reports 52. A journal voucher is a form on which journal entries to update the general ledger are documented. The individual entries are stored in the journal voucher file. This file is equivalent to the general journal in a manual AIS. The journal voucher file forms an important part of the audit trail as well. Various internal controls must be implemented in order to maintain adequate security and access control over the file, because it provides a way to alter and change the data contained in the general ledger. 53. Responsibility accounting involves the reporting of financial results on the basis of managerial responsibilities within an organization. Reports show actual amounts and variances to budget for the current month and year to date for items controllable at that level. 54. The balanced scorecard contains four perspectives of measurement of the organization. The perspectives are financial, internal operations, innovation and learning, and customer. Together these different perspectives provide a dimensional overview of organizational performance that is greater than financial measures alone. A scorecard that has been properly designed will measure key aspects of the organization's strategy as well as show important links across the perspectives or dimensions. 55. An audit trail shows the path of a transaction through the accounting system. It can provide information needed to trace any changes made to the general ledger by tracing either to or from an original source document to the general ledger. It helps in tracing all changes in general ledger accounts from beginning balances to ending balances as well as any adjustments made to the accounts. 56. XBRL (eXtensible Business Reporting Language) is a variation of XML, which is designed to communicate the content of data. XML improves upon HTML by being able to describe the content of the data presented. However, XML is limited when communicating financial information. For financial purposes, XBRL identifies each piece of data, along with how the data should be processed and how the data relate to other data items. XBRL may soon become the universal standard computer language for communicating financial data. XBRL enables organizations to publish financial information only once, using standard XBRL tags. XBRL tagged information is interpretable and doesn't need to be re-entered by users. 57. Budgets are managerial reports that can be extracted from the general ledger and reporting system. Budgets are used for planning and evaluating the organization's performance. There are several different types of budgets that an organization may use in this regard. The operating budget shows the planned revenues and expenditures for each organizational unit. Cash flow budgets compare the estimated cash inflows from operations with planned expenditures, and they are particularly useful to determine the borrowing needs of the organization. A capital expenditure budget shows the projected cash inflows and outflows for a given project. Budgetary reports should be tailored to the nature of the unit or department being evaluated, and they should show actual versus projected budget amounts. Unfortunately, many budget amounts are viewed as fixed targets, and they are therefore static and inflexible. Such an approach may either reward or penalize managers for factors that are beyond their control. A solution to this problem is to develop a flexible budget, in which variable budgeted amounts change in relation to some measure of organizational activity, such as labor hours, or a percentage of sales. A flexible budget may also break amounts into their respective fixed and variable components. Variable amounts can then be adjusted for fluctuations in sales or production. 58. Data mining is another way to access the information stored in a data warehouse. Data mining involves the use of sophisticated statistical analysis, including artificial intelligence techniques like neural networks, to discover new hypothetical relationships in the data. Credit card companies use data mining to identify patterns of use indicative of fraud. Similarly, data mining techniques can be used to identify previously unknown relationships in sales data that can then be used as the basis for future promotions. 59. All updates to the general ledger are properly authorized. All recorded general ledger transactions are valid. All valid, authorized general ledger transactions are recorded. All general ledger transactions are accurately recorded. General ledger data are safeguarded from loss or theft. General ledger system activities are performed efficiently and effectively. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 60. Threat 1: Errors in updating the general ledger because of inaccurate/incomplete journal entries or posting of journal entries - Controls: (1) Input, edit, and processing controls over summary entries from subsystems. (a) Validity check over existence of general ledger accounts. (b) Field check over numeric data in amount field. (c) Zero-balance check ensures equality of debits and credits (d) Completeness test - all pertinent data are entered (e) Redundant data check - closed loop verification to see if on account numbers and descriptions (f) Standard adjusting entry file for recurring entries - improves accuracy of the process (g) Sign check on debit and credit entries (h) Calculation of run-to-run totals can verify the accuracy of journal voucher batch processing (2) Reconciliation and control reports - can detect errors made during updating and processing; trial balances, clearing, and suspense accounts are examples (a) Balancing of control and subsidiary accounts (b) Control reports can help identify the source of errors in the general ledger update process - listings of journal vouchers and general journal entries will show entries posted to the general ledger and ensures equality of debits and credits (3) The audit trail - the path of transactions through the system-should be able to perform the following tasks: (a) Trace any transaction from its original source document to the general ledger; any other document or report using that data (b) Trace any item from a report or an output document to the general ledger and thence to the source document (c) Trace all changes in the general ledger balances from their beginning balance to their ending balance. THREAT 2: Loss or unauthorized disclosure or alteration of financial data - Controls: (1) User IDs, passwords, and access controls should be used (2) Enforce segregation of duties (3) Adjusting entries only from the controller's area (4) Valid authorization for journal voucher submission. THREAT 3: Loss or destruction of the general ledger - Controls: (1) Use of internal and external file labels to protect from accidental data loss (2) Make regular backup copies of the general ledger, one copy stored off-site (3) A good disaster recovery plan and (7) access and processing integrity controls to ensure confidentiality and accuracy of data transmitted to branch offices or externally. THREAT 3: Poor performance – Controls: (1) XBRL, (2) redesign business processes, and (3) redesign metrics used to report results of business activities. 61. The general ledger collects and reports financial information, and is it used to prepare the financial statements for an organization. The first statement that is prepared is the income statement. It is based on data from revenue and expense accounts that have been subject to adjustment. The adjusted trial balance is used to provide the balances used on the income statement (of course the adjusted trial balance is generated as part of the second step in the general ledger and reporting system). Revenue and expense accounts can then be "zeroed out" using closing entries, which will transfer any net income or loss to the retained earnings account. The balance sheet can then be prepared. The statement of cash flows is prepared after the balance sheet, because it uses data obtained from both the income statement and the balance sheet as well as other information about the organization's investing and financing activities. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 15 MULTIPLE CHOICE 1. There are five basic stages in the database design process. The step which includes developing the conceptual-, external-, and internal-level schema into the actual database structures is known as a) b) c) d) stage one. stage two. stage three. stage four. 2. Accountants should be involved in __________ aspect(s) of the database design process. a) b) c) d) only the physical modeling all only the data flow diagram only the requirements analysis 3. At what stage should accountants participate in the database design process? a) b) c) d) in stages one, two, and three in stages four, five, and six only in stage one in all six stages, although their level of participation may vary 4. The process of defining a database so that it faithfully represents all aspects of the organization including its interactions with the external environment is called a) b) c) d) data modeling. data designing. data development. data definition. 5. Accountants may provide the greatest value to their organization by taking responsibility for data modeling. In which stage(s) of the database design process does data modeling occur? a) b) c) d) only in the systems analysis stage only in the design stage in both the systems analysis and design stages of database design neither the systems analysis nor the design stages of database design 6. A(n) __________ diagram graphically depicts a database's contents by showing entities and relationships. a) b) c) d) DFD flowchart E-R REA 7. An entity-relationship diagram (E-R) is useful because it shows the various entities being modeled and the important relationships among them. Anything about which the organization wants to collect and store information is called a) a data model. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) an entity. c) a schema. d) a tuple. 8. An E-R diagram represents entities as __________ and the relationships between them as lines and __________. a) b) c) d) circles; squares squares; diamonds rectangles; diamonds rectangles; circles 9. An E-R diagram a) b) c) d) Can represent the contents of any database. Are only used in conjunction with REA models. Can show a limited number of entities and relationships Are used only to design new databases. 10. An E-R diagram a) b) c) d) only depicts the contents of a database. only graphically models an organization. only defines a database so that it represents all aspects of the organization. depicts both the contents of a database and graphically models an organization. 11. The REA data model a) b) c) d) Is used in many areas of business and science. Was developed solely for use in designing accounting information systems. Classifies data into relationships, entities and accounts. All of the above. 12. An example of an event is a) b) c) d) employees customers sales cash 13. An example of a resource is a) b) c) d) employees customers sales cash 14. An example of an agent is a) b) c) d) customer sales cash inventory 15. What does the acronym REA mean? a) resources, events, agents b) resources, entities, agents Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) relations, events, agents d) relations, entities, agents 16. In the REA data modeling technique, the identifiable objects that have economic value to the organization are called a) b) c) d) resources. assets. entities. objects. 17. The __________ in the REA model include all of the organization's business activities. a) b) c) d) resources events agents entities 18. The groups of people about which an organization collects data to help it better plan, control, and evaluate performance of its basic business activities are the a) b) c) d) employees. events. agents. entities. 19. Events must be linked to at least one a) b) c) d) Account Agent Entity Resource 20. Events must be linked to at least two a) b) c) d) Agents Entities Events Resources 21. Which of the following is not one of the rules that describe how the three types of entities should relate to one another in an REA data model? a) b) c) d) Each event is linked to at least one resource that it affects. Each event is linked to at least one other event. Each event is linked to at least two participating agents. All of the above are important rules. 22. The REA data model supports both __________ and __________ types of data. a) b) c) d) financial; nonfinancial logical; physical planning; control traditional; nontraditional Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 23. Nonfinancial information should be collected because a) b) c) d) it may indicate events that may affect resources. it can be used to plan other activities. it can be used in transaction processing. both A and B 24. Which is a true statement about the REA data model? a) b) c) d) The REA data model classifies entities into three distinct categories. The term REA is an acronym that stands for resources, entities, and agents. Using an REA data model is not helpful when creating an R-E diagram. The "E" in the REA data model stands for things that have an economic value to the organization. 25. An REA diagram must link every event to at least one __________ and two __________. a) b) c) d) resource; agents agent; resources transaction; entities resource; relationships 26. Each event in an REA model will in most cases have at least one __________ agent and one __________ agent involved with the event. a) b) c) d) internal; resource external; entity internal; employee internal; external 27. Relationships that affect the quantity of a resource are sometimes referred to as _______ relationships. a) b) c) d) commitment exchange stockflow none of the above 28. Using the REA data model, promises to engage in future economic exchanges are called a) b) c) d) commitments. economic exchanges. resources. agents. 29. The "give" event represents an activity which a) b) c) d) includes a promise to engage in future economic exchanges. increases the organization's stock of an economic resource. reduces the organization's stock of a resource that has economic value none of the above. 30. The "get" event represents an activity which a) includes a promise to engage in future economic exchanges. b) increases the organization's stock of an economic resource. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) reduces the organization's stock of a resource that has economic value d) none of the above. 31. Concerning the development of an REA model, which of the following statements is true? a) b) c) d) Events that pertain to the entry of data are included in the REA model. The objective is to model the basic value-chain activity. REA diagrams model individual transactions and data collections. Information retrieval events are modeled as events in the REA model. 32. Developing an REA diagram for a specific transaction cycle consists of how many steps? a) b) c) d) one two three four 33. Developing an REA diagram for a specific transaction cycle consists of steps. The first step involves a) b) c) d) Identifying events Identifying agents Identifying resources Identifying cardinality 34. Developing an REA diagram for a specific transaction cycle consists of steps. The second step involves a) b) c) d) Identifying agents Identifying resources Identifying cardinality Both a and b 35. Developing an REA diagram for a specific transaction cycle consists of steps. The third step involves a) b) c) d) Identifying events Identifying agents Identifying resources Identifying cardinalities of each relationship 36. The measure of how many instances of the other entity can be linked to one specific instance of a given entity is called a) b) c) d) a resource. a cardinality. an agent. an exchange event. 37. Concerning cardinality, which of the following is false? a) b) c) d) Cardinalities describe the nature of the relationship between two entities. No universal standard exists for representing information about cardinalities in REA diagrams. The minimum cardinality can be zero. The maximum cardinality can be zero. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 38. Concerning cardinality, which of the following is true? a) b) c) d) The three basic types of relationship between entities are identified by their minimum cardinality. The choice of cardinalities is arbitrary. The minimum cardinality is generally given last. Cardinality information is the final step in drawing an REA diagram 39. In an REA diagram, the pair of numbers next to each entity represents the cardinalities for the entity. The first number in the pair is known as a) b) c) d) the minimum cardinality. the maximum cardinality. the x axis cardinality. the y axis cardinality. 40. The minimum cardinality of a relationship in an REA diagram can be either a) b) c) d) 0 or 1. 0 or N. 1 or N. none of the above 41. The maximum cardinality of a relationship in a REA diagram can be either a) b) c) d) zero or one. one or many. zero or many. none of the above 42. How many types of relationships are possible between entities? a) b) c) d) one two three an infinite number 43. A one-to-many relationship exists between entities when the maximum cardinality of one entity is __________ and the maximum cardinality for the other entity in that relationship is __________. a) b) c) d) 1; 1 1; N M; N M; M 44. Cardinalities reflect __________ about the organization being modeled and its business practices. a) b) c) d) assumptions opinions facts theories 45. Assume the cardinalities associated in a relationship all have zero minimums and N maximums. This would be an example of which cardinality rule? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) agent-event relationship resource-event relationship event-event relationship none of the above relationships 46. Concerning REA diagrams, which of the following is false? a) b) c) d) Each organization will have its own unique REA diagram. An REA diagram for a given organization will change over time. Data modeling and REA diagram development involve complex and repetitive processes. Redrawing an REA diagram several times during development is uncommon. 47. Which of the following is not one of the five stages of database design? a) systems analysis b) conceptual design c) data modeling d) implementation 48. Data modeling is an element of a) Systems analysis b) Conceptual design c) Both A and B d) None of the above 49. The REA model classifies entities into three basic categories. Which of the following is one of these three? a) resources b) relationships c) accounting d) entities 50. Developing an REA model involves three steps. In which step are the agents identified? a) First b) Second c) Third d) None of the above SHORT ANSWER 51. What is data modeling? 52. What is an REA data model? 53. Name and describe the three parts of the REA data model. 54. List the five stages in the database design process. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. Define cardinality. 56. Identify the three basic rules that apply to the REA model pattern. 57. What are the three steps in developing an REA diagram? 58. Explain how an AIS system can be viewed as a set of "give-to-get" exchanges. ESSAY 59. Define minimum and maximum cardinalities. 60. Describe the possible relationships between entities in terms of cardinalities. 61. Comment on the statement, "Accountants can and should participate in all stages of the database design process." Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. B 2. B 3. D 4. A 5. C 6. C 7. B 8. C 9. A 10. D 11. B 12. C 13. D 14. A 15. A 16. A 17. B 18. C 19. D 20. A 21. D 22. A 23. D 24. A 25. A 26. D 27. C 28. A 29. C 30. B 31. B 32. C 33. A 34. D 35. D 36. B 37. D 38. D 39. A 40. A 41. B 42. C 43. B 44. C 45. B 46. D 47. C 48. C 49. A 50. B 51. Data modeling is the process of defining a database so that it faithfully represents all aspects of the organization, including its interaction with the external environment. 52. The REA data model is a conceptual modeling tool specifically designed to provide structure for designing an AIS database. The REA data model identifies what entities should be included in the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 AIS database and prescribes how to structure relationships among the entities in the AIS database. 53. REA stands for resources, events, and agents. Resources are defined as those things that have economic value to the organization. Events are the various business activities about which management wants to collect information for planning and control purposes. Agents are the people and organizations that participate in events and about which information is desired for planning, control, and evaluation purposes. 54. Systems Analysis, conceptual design, physical design, implementation and conversion, and operation and maintenance. 55. The cardinality of the relationship indicates how many occurrences of the entity on the other side of the relationship can be linked to a single occurrence of the entity on this side of the relationship. In relational database terms, cardinality provides information about how many rows in the other table can be linked to each row in this table. 56. Each event is linked to at least one resource that it affects. Each event is linked to at least one other event. Each event is linked to at least two participating agents. 57. Developing an REA diagram involves three steps. First, identify the basic events of interest (any activity about which management wants to collect information in order to plan, control, and evaluate performance). Second, identify the resources affected by and the agents who participate in ho e e en . Thi d, e kno ledge abo he o gani a ion b ine ac ice o add relationship cardinality information to the diagram. 58. An AIS system can be viewed as a set of "give-to-get" exchanges because such exchanges reflect the nature of the five transaction cycles: revenue, expenditure, human resources, production, and financing. In each cycle the organization "gives" some resource in exchange for another resource (the "get" part of the transaction). The goal is that the "give" part of the exchange is of lesser value than the "get" portion, thus generating a profit for the organization. The AIS should capture, record, and organize information relating to any transaction that occurs within a cycle. 59. A minimum cardinality indicates the number of instances of that entity that must be associated with at least one instance of the other entity. Minimum cardinalities can be 0 or 1. A maximum cardinality indicates the number of instances of that entity that can be linked to at most one instance of the other entity. Maximum cardinalities can be 1 or N (many). 60. There are three types or relationships possible between entities depending upon maximum cardinality. These are: A one-to-one relationship exists when the maximum cardinality of each entity is 1. A one-to-many relationship exists when the maximum cardinality on one entity is 1 and maximum cardinality of the other entity is N. A many-to-many relationship exists when the maximum cardinality of both entities is N. 61. Accountants are in a unique position within a business organization. They are intimately acquainted with the many business transactions that occur in an organization and they are knowledgeable about the policies and practices of the business itself as well as the environment within which it operates. The knowledge base and skill sets of the accountant should be put to good use in the development of database design to the fullest extent possible (although some accountants may not possess AIS coding and development skill sets). Consider that during the planning stage accountants provide some of the information used to evaluate the feasibility of the proposed project and they participate in making the decision itself. Accountants can identify user information needs and develop logical schema during the requirement analysis and design stages. Accountants can also help test the accuracy of the new database and application programs during the implementation stage of development. Accountants can also act as "subject matter experts" since they are knowledgeable users of the new system. They can also serve as managers of the system once it is up and running. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 16 MULTIPLE CHOICE 1. Integrating separate REA diagrams developed for individual transaction cycles into a single, comprehensive enterprise-wide data model a) is possible. b) requires understanding what the cardinalities in each separate diagram reveal about the organi ation s business policies and activities. c) provides a single comprehensive enterprise-wide model of the organization. d) all of the above are true. 2. An integrated REA diagram merges multiple copies of _______ and ______entities but retains multiple copies of ______ entities. a) b) c) d) Resource, event, agent Relationship, economic, accounting Resource, economic, agent Relationship, event, accounting 3. An integrated REA diagram contains multiple copies of a) b) c) d) 4. Accounts Agents Events Resource An integrated REA diagram merges multiple copies of some entities in order to a) Minimize the repetition of agent entities. b) Maximize the legibility of the comprehensive REA diagram by avoiding the need to have relationship lines cross one another. c) Both A and B are true. d) Both A and B are false. 5. An integrated REA diagram merges multiple copies of some entities in order to a) Minimize the repetition of agent entities. b) Maximize the legibility of the comprehensive REA diagram by avoiding the need to have relationship lines cross one another. c) Both A and B are true. d) Both A and B are false. 6. Combining REA diagrams for individual transaction cycles into a single, enterprisewide model adds two more rules to the three basic principles for drawing REA diagrams. Which of the following is not one of those two new rules? a) Every resource must be linked to at least one event that increments that resource and to at least one event that decrements that resource. b) If a specific event can be linked to more than one other type of event, but cannot be linked simultaneously to all of those other events, then the minimum cardinality between that event and every other event with which it may be associated must be 0. c) If a specific event can be linked to more than one other type of event, but cannot be linked simultaneously to all of those other events, then the maximum cardinality between that event and every other event with which it may be associated must be 0. d) None of the above Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7. Concerning a correctly drawn enterprise-wide REA diagram, which of the following statements is not true? a) Every event must be linked to at least one resource. b) Merging two transaction cycles on a common event may affect the minimum cardinalities between the merged event and the agents participating in that event. c) Every event must be linked to one agent who participates in that event. d) Creating a set of tables from an REA diagram automatically results in a well-structured relational database. 8. Which of the following is not one of the three steps to implementing an REA diagram in a relational database? a) b) c) d) Assign attributes to appropriate tables. Create a table for each distinct entity in the diagram and for each many-to-many relationship. Every event must be linked to at least one resource. Use foreign keys to implement one-to-one and one-to-many relationships. 9. REA diagrams for different organizations may be similar, but will likely result in different relationship cardinalities because of a) b) c) d) Differences in business policies Different designers of REA diagrams Different methods of drawing REA diagrams Errors in drawing REA diagrams 10. What is the first step to implementing an REA diagram in a relational database? a) b) c) d) Assign attributes to appropriate tables. Create a table for each distinct entity in the diagram and for each many-to-many relationship. Identify cardinalities. Use foreign keys to implement one-to-one and one-to-many relationships. 11. Concerning REA diagrams and relational databases, which of the following is true? a) A well designed relational database is the starting point for creating an REA diagram. b) A well-designed REA diagram will result in the occasional update, insert or delete anomaly problem in the relational database. c) Database design is generic for similar organizations. d) The design of a database is specific to the organization being modeled. 12. Concerning the creation of tables from an REA diagram, which of the following is false? a) A properly designed relational database has a table for each distinct entity in an REA diagram. b) A properly designed relational database has a table for each many-to-many relationship in an REA diagram. c) To reduce confusion, table names should not duplicate REA diagram entities' names. d) Many-to-many relationships will be shown in tables with hyphenated concatenations of the entities' names. 13. When assigning attributes to each table, a) The database designer must interview users to identify which facts should be included in the database. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) The database designer must interview management to identify which facts should be included in the database. c) The database designer must use the REA diagram to help determine in which tables those facts belong. d) All of the above. 14. Multiple attribute primary keys are a) b) c) d) Common Concatenated keys Disallowed Secondary keys 15. The primary key for M:N relationship tables a) b) c) d) Is a single attribute Always consists of two attributes Is the primary key of the most important entity linked to that relationship Is impossible to determine 16. Other attributes besides the primary key are a) b) c) d) Included to satisfy transaction processing requirements. Included to meet management's information needs. Both A and B None of the above 17. Concerning tables for M:N relationships, which of the following statements is false? a) b) c) d) Non-key attributes may be included. Multiple attribute primary keys are used. Single attribute primary keys may be used. Concatenated keys are used. 18. Concerning the creation of tables from an REA diagram, which of the following is false? a) b) c) d) Foreign keys are used to implement 1:1 and 1:N relationships. A table is created for each distinct entity. A table is created for each M:N relationship. Tables are completed with input data. 19. When implementing 1:1 and 1:N relationships a) b) c) d) Foreign keys are used. Separate tables could be used. The primary key of one entity becomes a foreign key in the other entity's table. Concatenated primary keys are used. 20. Concerning the creation of tables from an REA diagram, which of the following is false? a) M:N relationships must be implemented as separate tables. b) 1:N relationships are implemented with the primary key of the 1 side becoming a foreign key on the N side. c) 1:1 relationships are implemented with the primary key of either entity included as a foreign key in the table representing the other entity. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) All of the above are true 21. M:N relationships must be implemented a) b) c) d) As separate tables With concatenated primary keys Both A and B Neither A nor B 22. Which of the following is not part of a "final accuracy check" when creating relational tables from an REA diagram? a) b) c) d) Every attribute in every table is single-valued (i.e., each table is a flat file). Every event must be linked to at least one resource. Every table must have a primary key. Other non-key attributes in each table must be either a fact about the thing designated by the primary key or foreign keys used to link that table to another table. 23. When comparing REA diagrams used to design an AIS with a traditionally designed AIS, a) b) c) d) Traditional AIS information, such as journals and ledgers no longer exist. Similar information is present as in a traditional AIS but stored in a different format. Queries are used to input data into the AIS. An REA designed AIS cannot recreate a traditional journal. 24. Concerning the use of REA diagrams to retrieve information from a database: a) Although neither journals nor ledgers appear explicitly in an REA diagram, each can be created through appropriate queries. b) The information normally found in a journal is contained in the tables used to record data about events. c) Much of the information about an organi ation s assets that is traditionally recorded in ledgers is stored in resource tables in an REA-based relational database. d) All of the above 25. Much of the information about an organi ation s assets that is traditionally recorded in ledgers is stored in ______ tables in an REA-based relational database. a) b) c) d) Account Agent Event Resource 26. In an REA-based relational database, the information normally found in a _______ is contained in the tables used to record data about _______. a) b) c) d) Journal, events. Journal, resources. Ledger, events. Ledger, resources. 27. Concerning REA models, which of the following is false? a) Many financial statement accounts are represented as resources in the REA model. b) Accounts such as Accounts Receivable show up as entities in the REA model. c) Some accounts represent an imbalance between two related events in the REA model. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) Much of the information about an organi ation s assets that is traditionally recorded in ledgers is stored in resource tables in an REA-based relational database. 28. Because information about temporal imbalances between two _________, such as accounts receivable and accounts payable, is needed so frequently, such calculated values are sometimes stored as _________ in the appropriate tables. a) b) c) d) Events, agents. Events, attributes. Resources, agents. Resources, attributes. 29. Concerning the generation of financial statements from an REA-based relational database, which of the following is false? a) It is possible to use a completed REA diagram to guide the writing of queries to produce the information that would be included in financial statements. b) Many financial statement items can be displayed by querying a single table. c) It is unnecessary to understand the REA data model to know which tables need to be included in each query to generate the correct answers to financial statement questions. d) A major advantage of the REA data model is that it integrates non-financial and financial data. 30. In comparing the REA model to the traditional AIS, which of the following is false? a) Traditional AISs contain only data about the financial aspects of transactions. b) A major advantage of the REA data model is that it integrates non-financial and financial data in the AIS and makes both types of data easily accessible to management. c) In the REA model, many financial statement items can be displayed by querying a single table. d) Accounts in the traditional AIS are analogous to resources in the REA-based relational database. 31. The majors benefits of using the REA model as the basis for designing an AIS include all of the following except: a) The REA data model integrates non-financial and financial data in the AIS b) The REA data model makes both non-financial and financial data easily accessible to management. c) The REA data model provides the basis for building the kind of flexible AIS that is responsive to management s changing information needs, d) The REA data model reduces the need for accountants to understand the underlying accounting journals and ledgers. 32. Technological changes a) b) c) d) Do not change the mechanics of accounting procedures. Have little effect on accounting process. Do not change the need for management reports and financial statements. Are more easily adapted using traditional AIS models. 33. REA data modeling a) b) c) d) Can be used only to model financial data. Can provide accountants with a method for more easily adapting the AIS to respond to change. Is an example of a traditional accounting concept. Is just a fancy way of doing E-R diagramming. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 34. Concerning REA diagrams for individual transaction cycles, which of the following is false? a) They depict basic give-to-get economic duality relationships b) They usually provide only a partial view of resources c) They need to be combined in order to provide a comprehensive enterprise-wide data model. . d) They show both how resources are acquired and how they are used 35. Concerning enterprise-wide REA diagrams, which of the following is false? a) Merging two or more REA diagrams that contain the same resource entity does not require any changes to the cardinality pairs in the individual diagrams. b) Merging two or more diagrams that contain a common event entity, however, often requires changing the minimum cardinalities associated with the other events to 0, to reflect the fact that the merged event may be connected to any one of several different events, but not to all of them simultaneously. c) The minimum cardinalities associated with agents may also have to be changed to 0. d) All of the above are true 36. Concatenated keys a) b) c) d) Are only needed when combining two or more REA diagrams. Are foreign keys used to implement 1:N or 1:1 relationships. Are multiple attribute keys used to implement 1:M relationships. Are required to implement M:N relationships. 37. Which types of REA entities become separate tables in a relational database? a) b) c) d) Agents Events Resources All of the above. 38. How many tables are needed to implement an REA data model that has six distinct entities, three M:N relationships and four 1:N relationships in a relational database? a) b) c) d) 6 9 11 13 39. How many tables are needed to implement an REA data model that has five distinct entities, two M:N relationships and three 1:N relationships in a relational database? a) b) c) d) 5 7 8 10 40. Which type of relationship cardinality requires the implementation of a separate table? a) 1:0 b) 1:1 c) 1:N Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) M:N 41. When combining two REA diagrams by merging common entities, changes in the cardinality of the merged entity is needed when it is a a) b) c) d) Agent Event Relationship Resource 42. Where is information traditionally found in journals stored in an REA database? a) b) c) d) Agent Event Relationship Resource 43. Which table is most likely to have a concatenated key? a) b) c) d) customer sales customer-sales none of the above 44. An REA diagram contains five instances of the Customer entity. How many tables does this require in a relational database? a) b) c) d) one two three four 45. In an REA relational database, traditional ledger information is obtained by querying a) b) c) d) Agents Events Resource All of the above 46. Cardinalities reflect __________ about the organization being modeled and its business practices. a) b) c) d) assumptions opinions facts theories 47. _______ databases are commonly used to support transaction processing. a) b) c) d) Access E-R REA Relational 48. Integrating separate REA diagrams into a single comprehensive enterprise-wide model of the organization, requires understanding what the __________ in each separate diagram reveal about the organization's business policies and activities. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) cardinalities data events transactions 49. When merging redundant resource entities into a new REA diagram, a) b) c) d) Common resources are placed between the events that affect them. Each resource is connected to two agents that either increase or decrease it. Resources are duplicated to show the give and get of economic duality relationships. None of the above. 50. The five rules for drawing an integrated REA diagram a) Help develop a correct REA diagram b) Are used as check figures to validate the accuracy of a completed REA diagram. c) Both d) None of the above SHORT ANSWER 51. What kinds of databases can the REA data model be used to design? 52. In order to integrate separate REA diagrams into an integrated organizational REA model, what must the designer understand? 53. List the five rules for drawing integrated REA diagrams. 54. What is a concatenated key? 55. What are the three steps to implementing an REA diagram in a relational database? ESSAY 56. Explain a completeness check. 57. Explain where in the REA model you can find the information normally found in a ledger. 58. Explain where in the REA model you can find the information normally found in a journal. 59. What are the advantages of the REA data model over the traditional AIS model? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. D 2. A 3. B 4. B 5. B 6. C 7. C 8. C 9. A 10. B 11. D 12. C 13. D 14. B 15. B 16. C 17. C 18. D 19. A 20. D 21. C 22. B 23. B 24. D 25. D 26. A 27. B 28. B 29. C 30. D 31. D 32. C 33. B 34. D 35. D 36. D 37. D 38. B 39. B 40. D 41. B 42. B 43. C 44. A 45. D 46. C 47. D 48. A 49. A 50. C 51. The REA data model can be used to design both relational and object-oriented databases. 52. The designer must understand what the cardinalities in each separate diagram reveal about the organi ation s business policies and activities. 53. Every event must be linked to at least one resource. Every event must be linked to two agents who Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 54. 55. 56. 57. 58. 59. participate in that event. Every event that involves the disposition of a resource must be linked to an event that involves the acquisition of a resource. (This reflects the economic duality underlying give-to-get economic exchanges.) Every resource must be linked to at least one event that increments that resource and to at least one event that decrements that resource. If a specific event, referred to as the focal event, can be linked to more than one other type of event, but cannot be linked simultaneously to all of those other events, then the minimum cardinality between that focal event and every other event with which it may be associated must be 0. A concatenated key is a multiple-attribute primary key, general used for M:N relationships. Create a table for each distinct entity in the diagram and for each many-to-many relationship. Assign attributes to appropriate tables. Use foreign keys to implement one-to-one and one-tomany relationships. The list of attributes that users and management want included in the database provides a means to check and validate the implementation process. Every attribute in that list should appear in at least one table, as either a primary key or other attribute. Checking this list against the table column names may reveal not only the fact that a particular attribute has not been assigned to the appropriate table in the database but may even indicate the need to modify the REA diagram itself. In traditional AISs, ledgers are master files that contain cumulative information about specific accounts. In a relational database designed according to the REA data model, resource and agent entities contain permanent information that is carried over from one fiscal year to the next. Thus, much of the information about an organi ation s assets that is traditionally recorded in ledgers is stored in resource tables in an REAbased relational database. In traditional AISs, journals provide a chronological listing of transactions. In a relational database designed according to the REA data model, event entities store information about transactions. Thus, the information normally found in a journal is contained in the tables used to record data about events. For example, each row in the Sales event table contains information about a particular sales transaction. Thus, a sales journal can be produced by writing a query that displays the appropriate entries in the sales table for a given period. In a similar manner, queries of the Order Inventory event and Cash Disbursements event tables can be used to generate purchases and cash disbursements journals. A major advantage of the REA data model is that it integrates non-financial and financial data in the AIS and makes both types of data easily accessible to management. In contrast to the REA data model, the general ledger in traditionally designed AISs uses the chart of accounts to store and organize data based on the structure of financial statements. Consequently, traditional AISs contain only data about the financial aspects of transactions. Other information that may be of use to management, such as the time of day a sale occurred or the reason why a customer was purchasing a specific item, would have to be stored in a separate database or information system. The existence of separate systems makes it more difficult for management to easily and quickly access the information it needs. It also provides opportunities for data entry errors to create inconsistencies between systems, thereby reducing the utility of any reports that are generated. Thus, a major benefit of using the REA model as the basis for designing an AIS is the ability to easily integrate information that traditionally appears in financial statements with other, non-financial information necessary to effectively manage operations and evaluate performance. It is vitally important that an organi ation s AIS be capable of storing both traditional financial measures and other operational performance measures. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 17 MULTIPLE CHOICE 1. Explicitly identifying the different employees who participate in each event by their job functions is helpful when verifying a) Internal controls. b) Job descriptions. c) Proper supervision. d) Segregation of duties. 2. Many companies sell software, music, or digital photographs over the Internet. They give up a digital copy of those resources, but not the actual resource itself. How will this company's REA model differ from those selling traditional inventory? a) These companies do not need an Inventory table. b) The structure of Inventory table is completely different from that of massproduced merchandise. c) The inventory table is only different in that it doesn't need attributes such as quantity-on-hand, quantity-available, reorder point, and standard reorder quantity. d) The Inventory table need not include information about the standard list price of each item and its description. 3. The minimum cardinality from the Take Order event to the Call on Customer event is _____ and the maximum cardinality is _____. a) b) c) d) 0;0 0;1 1;0 1;1 4. The relationship between the Fill Customer Order and Ship Order events is 1-1. The minimum cardinalities reflect the fact that the two events are sequential. a) b) c) d) 0:N 1:1 1:N M:N 5. Sales order number is most likely to be a foreign key in: a) Call on Customers b) Fill Customer Order c) Ship Order d) Take Customer Order 6. Sales order number is most likely to be a primary key in: a) Call on Customers b) Fill Customer Order c) Ship Order d) Take Customer Order Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7. Customer number is least likely to be a foreign key in: a) Call on Customers b) Customers c) Fill Customer Order d) Take Customer Order 8. Picking ticket number is most likely to be a primary key in: a) Call on Customers b) Fill Customer Order c) Ship Order d) Take Customer Order 9. Picking ticket number is most likely to be a foreign key in: a) b) c) d) Call on Customers Customers Fill Customer Order Ship Order e) Take Customer Order 10. In an REA model, rental transactions differ from sales transactions in that a) b) c) d) Each rental has a part number. Each rental has a unique serial number Rental transactions require completely different REA models than sales transactions. All of the above. 11. Concerning the relationship from the Rent Item to the Receive Cash event: The minimum cardinality is______ because customers typically pay first, prior to taking possession of the item. The maximum cardinality is _____ because there may be additional charges imposed when the item is returned. a) 0,1 b) 1,1 c) 1,N d) N,M 12. The relationship between the Rent Item and Return Item events is ____. a) b) c) d) 13. 0:N 1:1 1:N M:N Which of the following is an example of an additional event that larger organizations might want to include in their REA models? a) Purchase requests b) Purchase orders c) Sales Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) None of the above 14. Concerning cost data, which of the following is false? a) Cost information is stored in several tables. b) Standard cost is stored as an attribute of the Inventory table because it is the same for all units of a given inventory item for a fiscal year. c) In contrast, the actual cost of inventory is stored in the Inventory-Order_Goods table because purchase prices can vary over time. d) Actual cost can be stored as an attribute of the Inventory table for organizations using LIFO or FIFO. 15. Which is the most likely primary key for the Inventory Request_Goods table? a) b) c) d) Product number Product number - Purchase order number Product number - Purchase requisition number Purchase requisition number 16. Which is the most likely primary key for the Pay for Goods table? a) b) c) d) Cash transaction number Check number Receiving report number Receiving report number, check number 17. Concerning the sale of services, the minimum cardinality from the Sales event to the Services entity is ____. However, the minimum cardinality from the Sales event to the Inventory Resource is ____. a) 0;0 b) 0;1 c) 1;0 d) 1;1 18. The REA model for sale of services includes relationships between the Sales event and both the Services and Inventory Resource entities. The nature of the cardinality of those relationships depends on the specific business, but usually both relationships will be modeled as being _____because most businesses provide the same types of services to many different customers, using standard mass-produced parts. a) b) c) d) 0:N 1:1 1:N M:N 19. M:N agent-event relationships occur whenever an activity is performed by _________ employee and management wants to retain the ability to monitor _________ performance. a) More than one, group b) More than one, individual c) One, group Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) One, individual 20. Most locations, such as Warehouse or Financial Institution, will have a minimum cardinality of a) b) c) d) 0 1 M None of the above 21. Since, the same inventory items may be stored in several different warehouses, hence the maximum cardinality from Inventory to Warehouses is ____ and the minimum cardinality from the Inventory resource to Warehouses may be ____. a) b) c) d) 0; N N; 0 1; N M; N 22. Relationships between resources and agents, such as the Inventory Resource entity and the Supplier Agent entity, reflect the common best practice of identifying preferred and alternative suppliers for specific inventory items. Similar relationships between resources and employees can be used to model __________ and __________. a) b) c) d) Cost; revenue Performance; behavior Responsibility; accountability Segregation of duties; internal control 23. Warehouse number is most likely to be a foreign key in: a) b) c) d) Order Goods Pay for Goods Receive Goods Warehouse 24. Supplier number is least likely to be a foreign key in: a) b) c) d) Order Goods Pay for Goods Receive Goods Warehouse 25. Financial institution number is most likely to be a foreign key in: a) b) c) d) Cash Pay for Goods Receive Goods Warehouse 26. The cardinality pair from the Financial Institution entity to the Cash resource has a ___ minimum and an ___ maximum because companies will probably only keep Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 information about financial institutions with which they have accounts but may have more than one account at the same financial institution. a) b) c) d) 0; N 0; 1 1; N M; N 27. Supplier number is most likely to be a foreign key in: a) b) c) d) Inventory Request_Goods Receive Goods Supplier Warehouse 28. In the HR REA M/payroll diagram, the __________ entity is linked to almost every other entity in the diagram. a) Employee b) Job title c) Payroll d) Worker I.D. 29. In the human resources REA model, the relationship between Skills and Employees is modeled as a) b) c) d) 0:N 1:1 1:N M:N 30. The __________ entity stores much of the data typically found in the employee (payroll) master file: a) b) c) d) Accounting Employee HR Payroll 31. In the human resources REA model, the relationship between the Employees and Training is a) b) c) d) 1:1 1:N M:N None of the above 32. The ______ relationship between Skills and Recruiting reflects the fact that each advertisement may seek several specific skills and that, over time, there may be several advertisements for a given skill. a) b) c) d) 1:1 1:N M:N None of the above Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 33. The Interview event stores detailed data about each job interview. It is linked to the Hire Employees event in a(n) _____ relationship. a) b) c) d) 1:1 1:N M:N None of the above 34. Concerning the issuance of debt, the cardinality of the relationship from the Disburse Cash event to the Issue Debt event has a _____ maximum. a) b) c) d) 0 1 M None of the above 35. Concerning the issuance of debt, the cardinality of the relationship from the Disburse Cash event to the Issue Debt event has a _____ minimum. a) b) c) d) 0 1 M None of the above 36. The cardinality pair from the Order Goods event back to the Request Goods event also has a ___ minimum and ___ maximum. a) 0,1 b) 0,N c) 1,N d) N,M 37. The cardinality pair from the Request Goods event to the Order Goods event has a minimum cardinality of ____ and a maximum of ____. a) 0,1 b) 0,N c) 1,N d) N,M 38. The relationship between the Disburse Cash and Issue Stock events is modeled as being a) b) c) d) 1:1 1:N M:N None of the above Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 39. Concerning the relationship between the Disburse Cash and Issue Stock events the minimum cardinalities are (respectively) a) 0;0 b) 0;1 c) 1;0 d) 1;1 40. The relationship between the Acquire Services and Disburse Cash events is modeled as ____ to reflect the common situation in which the organization obtains the use of a specific service for a particular period of time and makes a payment each month for the services it acquired and used that month. a) b) c) d) 1:1 1:N M:N None of the above 41. Concerning tracking employee time, it is not necessary to link the Track Time Used entity to specific business events, however, but doing so facilitates a) evaluating performance at a very detailed level b) general performance evaluation c) evaluating the quality of the services d) All of the above are true 42. An REA diagram for the production cycle, models the relationships between the Job Operations event and the Job Operations List entity, and between the Machine Operations event and the Machine Operations List entity, as being (respectively) a) b) c) d) 1:1; 1:1 1:N; 1:N M:N; M:N 1:N; M;N 43. Data about actual raw materials used in production is stored in the __________ entity. a) b) c) d) Finished goods Raw materials Raw materials issuance Work-in-process 44. The _________ entity is used to collect and summarize data about the raw materials, labor, and machine operations used to produce a batch of goods. a) b) c) d) Finished goods Raw materials Raw materials issuance Work-in-process 45. In the table called Perform Machine Operations, which is the likeliest primary key? a) Equipment number Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) Job Operation number c) Machine Operation Number d) Machine Operations List Number 46. Employee number is most likely to be a foreign key in: a) b) c) d) Perform Job Operations Perform Machine Operations Machine Operations List Work in Progress 47. W-I-P job number is least likely to be a foreign key in: a) b) c) d) Perform Job Operations Perform Machine Operations Issue Raw Materials Machine Operations List 48. There are four main events of interest included in a typical production cycle REA diagram. Which of the following is not one of them? a) Issuance of raw materials b) Use of general and administrative expenses c) Use of labor in production d) Use of machinery and equipment in production 49. One of the benefits of an integrated enterprise-wide data model is that a) Auditors can use it to guide the development of queries to validate the completeness and accuracy of transaction processing. b) Journals and ledgers will be more accurate than in a traditional AIS data model. c) Workers can understand information flows better. d) All of the above 50. An REA diagram for the production cycle would likely show _____ relationships between the Bill of Materials entity and both the Raw Materials and Finished Goods entities. a) b) c) d) 1:1 1:N M:N None of the above SHORT ANSWER 51. What four main events of interest are included in a typical production cycle REA diagram? 52. Give an example of an M:N Agent-Event relationship 53. Why is the event Issue Debt often modeled as a separate event entity? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 54. Why might an REA diagram show relationships between agents? 55. Why might an REA diagram show relationships between resources and agents? ESSAY 56. Why is cost information stored in several relational tables? 57. What are the benefits of an integrated enterprise-wide data model? 58. Describe the relationships between Recruiting event and Skills, and between Recruiting event and Job Applicants. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. D 2. C 3. B 4. B 5. B 6. D 7. B 8. B 9. D 10. B 11. C 12. B 13. A 14. D 15. C 16. B 17. C 18. D 19. B 20. A 21. B 22. C 23. C 24. D 25. A 26. C 27. B 28. A 29. D 30. B 31. C 32. C 33. B 34. B 35. A 36. B 37. B 38. C 39. A 40. A 41. A 42. B 43. C 44. D 45. C 46. A 47. D 48. B 49. A 50. B 51. 1 Issuance of raw materials. 2 Use of labor in production. 3 Use of machinery and equipment in production. 4 Production of new finished products. 52. Some deliveries are so large that several employees must work together to unload and store the Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 53. 54. 55. 56. 57. 58. items. M:N agent-event relationships occur whenever an activity is performed by more than one employee, yet management wants to retain he abili o moni or each indi id al performance. The event Issue Debt is a special kind of cash receipt. It is often modeled as a separate event entity because it contains distinctly different attributes from those associated with cash receipts that arise from the Sales event, such as the face amount of debt issued, total amount received, date issued, maturity date, and interest rate. Relationships between internal agents may be created to model lines of responsibility. Relationships between internal and external agents can also occur. For example, some organizations that provide primarily services, such as banks and insurance companies, may assign customers to specific employees who are responsible for effectively managing the overall quality of the ongoing association with each customer. Relationships between external agents are rare but may sometimes be implemented to satisfy the requirements for a well-structured database. For example, the REA model for the expenditure cycle includes a relationship between the Inventory Resource entity and the Supplier Agent entity. This relationship reflects the common best practice of identifying preferred and alternative suppliers for specific inventory items. Similar relationships between resources and employees can be used to model responsibility and accountability. Cost information is stored in several tables. Standard cost is stored as an attribute of the Inventory table because it is the same for all units of a given inventory item for a fiscal year. In contrast, the actual cost of inventory is stored in the Inventory- Order_Goods table. This reflects the fact that purchase prices can vary over time. By storing the cost of each order with the quantity purchased, the system can calculate the actual cost of ending inventory and the cost of goods sold according to any accepted inventory valuation method (LIFO, FIFO, weighted-average, or specific identification). If, on the other hand, actual cost were stored as an attribute of the Inventory table, it would necessitate using the weighted-average method because all units of a given inventory item would be assigned the same cost. In addition, cost data would be available only in this format; it would be impossible to compute alternative values for inventory because the detailed data about the cost associated with each purchase would not be stored in the database. One of the benefits of an integrated enterprise-wide data model is that auditors can use it to guide the development of queries to validate the completeness and accuracy of transaction processing. In contrast, an integrated, enterprise-wide data model provides greater flexibility for analyzing data. Creating an integrated, enterprise-wide data model also facilitates the amalgamation of financial and non-financial information in the same database. Effective integration of financial and nonfinancial data also results in improved internal reporting. It can also significantly improve the support provided for managerial decision-making. The Recruiting event entity stores data about activities performed to notify the public of job openings. The data recorded in this entity are useful for documenting compliance with employment laws and also for evaluating the effectiveness of various methods used to announce job opportunities. The M:N relationship between Skills and Recruiting reflects the fact that each advertisement may seek several specific skills and that, over time, there may be several advertisements for a given skill. The relationship between the Recruiting event and Job Applicants is modeled as being M:N because many people typically apply for each job opening, but a given individual may also respond to more than one recruiting event. Also, more than one employee may participate in each recruiting event, and, over time, a given employee may participate in many such events. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 CH 18 MULTIPLE CHOICE 1. Organizations continually face the need for new, faster, and more reliable ways of obtaining information. One reason why companies change their systems is to increase quality, quantity, and the speed with which information can be accessed and processed. Such an improvement may result in an improved product or service and may help lower costs. This change is referred to as a(n) a) b) c) d) competitive advantage improved business process productivity gain technological change 2. An antiquated information system used by an office supply manufacturer caused customer dissatisfaction since it took two days to process a telephone order. After the system was upgraded and redesigned, the time to process a telephone order was reduced to three minutes. This is a prime example of a) b) c) d) a competitive advantage. a technological change. an improved business process. growth. 3. What is the correct sequence of the phases in the systems development life cycle? a) conceptual design, physical design, system analysis, implementation and conversion, and operations and maintenance b) conceptual design, system analysis, physical design, implementation and conversion c) system analysis, conceptual design, physical design, implementation and conversion, and operations and maintenance d) system analysis, physical design, conceptual design, and operations and maintenance 4. In which phase of the systems development life cycle are the broad needs of the users converted into detailed specifics that are coded and tested? a) b) c) d) conceptual design implementation and conversion physical design systems analysis 5. In which phase of the systems development life cycle are the new hardware and software for a system tested? a) b) c) d) conceptual design implementation and conversion operations and maintenance physical design 6. Which of the following activities is performed during the systems development life cycle? a) b) c) d) assessing the ongoing feasibility of the project managing the behavioral reactions to change planning All of the above activities are performed during the life cycle. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 7. Which group of individuals listed below can be the most effective in generating employee support and encouraging the development and acceptance of an AIS project? a) b) c) d) accountants information systems steering committee management project development team 8. Which group listed below has responsibility for ensuring that the new AIS will meet the needs of users? a) b) c) d) accountants the information system steering committee the project development team the system analysts and programmers 9. Who is responsible for preparing the specifications that are used to create the programs? a) b) c) d) management programmers systems analysts the information systems steering committee 10. Whether systems changes are major or minor, most companies go through a system development life cycle. How many steps are there in this cycle? a) b) c) d) 2 3 4 5 11. One step in the systems development life cycle (SDLC) identifies and evaluates design alternatives and to develop design specifications. This step is called a) b) c) d) conceptual design. implementation and conversion. physical design. systems analysis. 12. In which step of the SDLC do all of the elements of the system come together? a) b) c) d) conceptual design implementation and conversion physical design systems analysis 13. What is the role of the information systems steering committee? a) It is a team of systems specialists, managers, accountants, and auditors that guides project development. b) Since AIS development spans functional and divisional boundaries, an executive-level group is established to plan and oversee the IS function. c) The group takes an active role in designing system controls and periodically monitoring and testing the system to verify the controls are implemented and functioning properly. d) None of the descriptions above are appropriate. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 14. Which group of professionals is responsible for planning and monitoring a project to ensure timely and cost-effective completion? a) b) c) d) information systems steering committee management project development team system analysts 15. All of the following are benefits of planning and managing systems development with the exception of a) b) c) d) controlling costs ensuring that the system is consistent with the organization's goals. guaranteeing use of the system helping keep the organization abreast of technological change 16. In which plan is the prioritized list of projects contained? a) b) c) d) project development plan scheduled project plan the master plan all of the above 17. What is the planning horizon for the master plan? a) b) c) d) one year three years five years seven years 18. What is the basic building block of information systems planning? a) b) c) d) the master plan the project development plan systems analysis adaptability 19. A planning horizon of at least __________ years is reasonable for any master plan; however, the plan should be updated at least __________ each year. a) b) c) d) 3; twice 5; twice 7; once 5; once 20. __________ requires that all activities and the precedent and subsequent relationships among them be identified. a) b) c) d) CASE The Gantt chart The PERT diagram The SDLC cycle Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 21. A network of arrows and nodes representing project activities that require an expenditure of time and resources and the completion of initiation of activities, respectively, is called a) b) c) d) a Gantt chart. a PERT diagram. a SDLC cycle. CASE. 22. Which planning technique does not show the relationships among various activities? a) b) c) d) Gantt chart PERT the critical path method VAN 23. In which phase of the systems development life cycle is the feasibility study first performed? a) b) c) d) conceptual design implementation and conversion physical design system analysis 24. A federal law demands that certain information about foreign customers should be maintained in the information system. In which part of a feasibility study should this requirement be considered? a) b) c) d) economic feasibility legal feasibility operational feasibility technical feasibility 25. Which of the following parts of a feasibility study is generally considered the most important and is frequently re-analyzed? a) b) c) d) economic feasibility operational feasibility scheduling feasibility technical feasibility 26. What is the basic model used to create a framework for economic feasibility analysis? a) b) c) d) the capital budgeting model the cash budgeting model the cost/benefit model All of the above models are used to create a framework. 27. What is most difficult item to quantify when assessing economic feasibility? a) b) c) d) benefits costs Costs, benefits, and the payback period are all of equal difficulty. the payback period Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 28. When using the payback method to determine economic feasibility of projects, the company usually accepts the project with the a) b) c) d) longest payback period. mid-range payback period. payback period that is equal to the project's economic life. shortest payback period. 29. Systems development planning is an important step in the SDLC for a number of reasons. When management is better prepared for future resource needs and employees are better prepared for the changes that will occur, it can be said that the systems development planning has a) b) c) d) adaptability. attained lower costs. consistency. reached a level of efficiency. 30. What is another name for a feasibility study? a) b) c) d) a business case a Gantt chart an executive summary PERT 31. There are several important aspects to be considered during a feasibility study. The aspect that asks the question, "Can people use the system and will they use it?" is called a) b) c) d) economic feasibility. operational feasibility. scheduling feasibility. technical feasibility. 32. The question of economic feasibility is important when designing and implementing a new system. Accountants can contribute to feasibility study analysis by evaluating cost savings and other benefits versus operating costs and other cash outflows. This is better known as a) b) c) d) the "best guess" model of benefit analysis. the "value added" benefit model. the capital budgeting model. the estimated benefits model. 33. It is appropriate to develop several different design approaches to meeting system requirements for a project. Capital budgeting techniques are used to evaluate the economic merits of each alternative. The technique where estimated future cash flows are discounted back to the present is referred to as a) b) c) d) the future value method. the internal rate of return. the net present value method. the payback method. 34. The type of resistance in which data are erroneously entered into a system is called Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 a) b) c) d) acceptance. aggression. avoidance. projection. 35. Continuing to use a manual system instead of the new AIS is a form of resistance known as a) b) c) d) acceptance. aggression. avoidance. projection. 36. To minimize adverse behavioral reactions, the organization must first understand why resistance to change occurs. One behavioral problem occurs when there is insufficient explanation of why a change must take place. This type of problem falls into the general category of a) b) c) d) communication. natural resistance to change. the manner in which the change is introduced. top management support of change. 37. Major resistance to change takes one of several forms. What is the name of the form of resistance where the new system is blamed for any and every unpleasant occurrence? a) b) c) d) aggression avoidance procrastination projection 38. To minimize adverse behavioral reactions, the organization must first understand why resistance to change occurs. One behavioral problem occurs when there is insufficient explanation of why a change must take place. In order to curtail this resistance from occurring within the organization, what guideline should be implemented and followed? a) b) c) d) attempt to meet the users' needs avoid emotionalism keep communication lines open keep the system simple 39. A good rule to follow is "Avoid complex systems that cause radical changes." What expression is used to describe this system design rule? a) b) c) d) humanize the system keep the system simple present the system in its proper context test the system's integrity 40. During what step in systems analysis is an examination made of each development activity to define the problem to be solved? a) information needs and systems requirements Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) the feasibility study c) the initial investigation d) the systems survey 41. When is a proposal to conduct a systems analysis prepared? a) b) c) d) after a written request for systems development is prepared after the development team completes the survey of the existing AIS after the initial investigation of the project is approved before the initial investigation 42. During which phase of systems analysis does modeling of the existing system occur? a) b) c) d) information needs and system requirements the feasibility study the initial investigation the systems survey 43. Which data-gathering approach is most helpful when the information to be gathered deals with question: "Why?" a) b) c) d) interviews observation by the analyst questionnaires system documentation 44. Which method of data gathering is most likely to result in information that represents the personal biases and opinions of the person giving the information? a) b) c) d) a questionnaire an interview observation by the analyst system documentation 45. When the information is brief and well defined, which is the best data-gathering approach to use? a) b) c) d) a questionnaire an interview observation by the analyst system documentation 46. Which is the best data-gathering approach to use when information must be obtained from many different people? a) b) c) d) a questionnaire an interview observation by the analyst system documentation 47. The __________ method of gathering information helps to determine how a system actually works. a) b) c) d) interview observation questionnaire system documentation Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 48. The __________ method of gathering information helps to determine how a system should work. a) b) c) d) interview observation questionnaire system documentation 49. What are the best strategies for determining system requirements? a) analyze existing systems, ask users what they need, prototyping, and monitoring b) ask users what they need, analyze existing systems, develop concept of new system, and prototyping c) ask users what they need, analyze existing systems, examine existing system utilization, and prototyping d) ask users what they need, analyze existing systems, examine existing system utilization, and develop concept of new system 50. How frequently should an AIS be monitored and any minor modifications be made to it? a) b) c) d) annually continuously when technology changes when the competition changes its systems 51. When would a company go through a systems development life cycle? a) only when major changes are needed b) only when minor changes are needed c) Usually a company only goes through one complete systems development life cycle, after which the only phase that is repeated is the operations and maintenance phase. d) whenever minor or major changes are needed 52. What report serves as a repository of data from which systems designers can draw information? a) b) c) d) the executive steering committee report the initial investigation report the systems analysis report the systems survey report 53. Which group is responsible for preparing a systems analysis report? a) b) c) d) computer analysts management the project development team the steering committee 54. Proper systems analysis is a five-step process. What is the step in which analysts conduct an extensive study of the present system to gain a thorough understanding of how it works? a) feasibility study b) information needs and requirements c) systems analysis report Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) systems survey 55. The question of what the project should and should not accomplish is determined in what step of systems analysis? a) b) c) d) feasibility study initial investigation systems analysis report systems survey 56. A method used to gather information about an existing system is to make a model of it. There are several approaches to modeling in systems analysis. Logical modeling a) b) c) d) comes only after a physical model of the existing system is created. describes how a system should work, rather than how it actually works. illustrates how a system functions by describing the flow of documents and computer processes. illustrates what is being done, regardless of how that flow is actually accomplished. 57. It is important for the systems analyst to determine AIS system objectives so that everyone involved can focus on the elements most vital to the system's success. The __________ objective states that crucial information should be produced first and then less important items as time permits. a) b) c) d) flexibility reliability timeliness usefulness 58. One strategy used by systems analysts is prototyping. What is this? a) making an internal and external review of the system to be analyzed b) making an internal and external review of the system to be analyzed, noting that users may not use the existing AIS as intended c) simply asking users what they need d) when it is difficult to identify a usable set of requirements, a developer can quickly "rough" out a system for users to critique SHORT ANSWER 59. Identify the main reasons why companies change existing systems? 60. Name the five phases of the systems development life cycle. 61. What are the three other main activities performed during the SDLC? 62. Who makes up the project development team and what is the team's purpose? 63. What are the five phases of systems analysis? 64. What are the objectives of a system survey? 65. What four strategies can be used for determining user requirements? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 66. Identify and briefly discuss the points at which a "go/no go" decision is made in the systems analysis process. 67. What is the physical design stage of the systems development life cycle? 68. What is the importance of the master plan in systems development? ESSAY 69. Discuss the role of the groups that influence the development and implementation of an AIS. 70. What is economic feasibility analysis? What techniques are used in economic feasibility analysis? 71. Discuss the relative advantages and disadvantages of the four different methods for gathering data during a systems survey. 72. Discuss the aspects that must be considered during a feasibility study. 73. What are some of the reasons why behavioral problems occur when a new AIS is introduced? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. A 2. C 3. C 4. C 5. B 6. D 7. C 8. D 9. C 10. D 11. A 12. B 13. C 14. C 15. C 16. D 17. B 18. B 19. A 20. C 21. B 22. A 23. D 24. B 25. A 26. B 27. A 28. D 29. A 30. A 31. B 32. C 33. C 34. B 35. C 36. A 37. D 38. C 39. B 40. C 41. C 42. D 43. A 44. B 45. A 46. A 47. B 48. D 49. C 50. B 51. D 52. C 53. C 54. D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. B D C D Changes in user needs or business needs due to growth, consolidation, a merger, new regulations, or changes in regional and global relationships. Technological changes due to advances, improvements, and lower costs. Improvement of business processes to eliminate inefficiency. Competitive advantage from increased quality, quantity, and speed of information will result in an improved product to be sold at a lower price. Productivity gains that automate clerical and repetitive tasks and decrease performance time. Outgrowing old systems requires upgrades or the installation of completely new systems. Downsizing - moving from mainframes to networked PCs to get a better price/performance ratio. Systems age and need to be replaced. Five phases - systems analysis, conceptual design, physical design, implementation and conversion, and operations and maintenance. Other main activities - planning the change, managing the behavioral reactions to change, and assessing the ongoing feasibility of the project The project development team includes systems specialists, managers, accountants, internal auditors, and users. The project development team's duties include planning each project, monitoring it to ensure timely and cost-effective implementation, properly introducing changes after considering the human element, and communication with the top management and the steering committee at all steps in the process. Initial investigation of each development activity to define the problem to be solved. Systems survey to study the present system and gain a thorough understanding of how it works. Feasibility study with special focus on the economic feasibility of the project. Information needs and system requirements which will identify the needs of users and determine the objectives of the new system. Systems analysis report which provides management with the findings of the analysis phase. Analyze existing operations, policies and procedures, and data and information flow to gain a thorough understanding of the current system including its strengths and weaknesses. Make a preliminary assessment of current and future processing needs, and determine both the extent and nature of the changes that are needed. Develop relationships with users and build coalitions to gain support for the AIS. Collect data that identify user needs, conduct a feasibility analysis, and make recommendations to the management . Ask users what they need. Analyze existing systems. Examine existing system utilization. Create a prototype. There are three points at which a "go/no go" decision can be made during systems analysis. The first point is during the initial investigation, in which a decision will be made whether to conduct a systems survey. The second point is at the end of the feasibility study, at which point a decision will be made whether to proceed to the information requirement stage. The third (and last) point is at the completion of the analysis phase, which is the point at which a decision is rendered about whether to proceed to the design phase. The physical design stage of the systems development life cycle (SDLC) is the third of five stages in the lifecycle, coming after the systems analysis and conceptual design stages. In this stage of the SDLC, input, output, and database attributes are designed, as well as various controls. Programs and procedures are developed during this stage as well. A final part of this stage is the delivery of the developed system, which will be further enhanced during the implementation and conversion stage of the SDLC. A master plan is a long-range planning document specifying the components of the system, how the system will be developed, who will do the developing, how resources will be acquired for development, and the direction the AIS will take into the future. The document should give a status of projects already in process, prioritize them, describe criteria for prioritization and provide a timetable for their development. A master plan should span a time period of three years, and it should be updated at least two to three times each year. Management - support from management is crucial in successful development and implementation of an AIS. Any actual or perceived lack of support from management may cause skepticism and a lack of "buy in" from employees. Accountants - determine the user requirements and communicate Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 to system developers; members of the project development team; design system controls and monitor and test the system. Accountants can also help in assessing and tracking costs of projects. Information systems steering committee - a cross-functional, executive-level team that champions the project and is responsible for high-level support of the project. Sets policies that govern AIS systems analysts - study existing systems, design new ones, and prepare system specifications for computer programmers. Systems programmers - write computer programs based on specifications and requirements created by the system analysts. External players - customers, vendors, auditors, and regulations from governmental entities influence design of an AIS. 70. The capital budgeting model is used as the foundation for economic feasibility analysis. In this model, cost savings and other (even intangible) benefits, as well as initial outlay costs, operating costs, and other cash outflows are quantified in terms of dollars and cents. The tangible and intangible benefits include cost savings; improved customer service, overall increased productivity; improved decision making and data processing; better management control; and increased job satisfaction and employee morale. The costs include: software acquisition; design; programming; testing; documentation and maintenance costs; site preparation; and human resource costs such as hiring, testing, and relocation. The capital budgeting model is used as a framework for economic feasibility analysis. The three techniques that are used are: -- Payback period: The number of years for the net savings to recover the initial costs of the investment is calculated. A project with the shortest payback period is preferable under this method. -- Net Present Value (NPV): A discount rate representing the time value of money is used to discount all future cash flows to the present. The initial outlay costs are deducted from discounted cash flows to obtain net present value. A positive NPV indicates favorable economic feasibility. -- Internal Rate of Return (IRR): IRR is the effective interest rate that results in an NPV of zero. This effective interest rate is compared with a company's desired rate of return (sometimes it can be the cost of capital). A project with the highest IRR will be selected when this method is used for evaluation purposes. 71. Interviews: Advantages of this method include: answers to "why" questions; a way to build relationships; analysts can easily probe and ask follow-up questions; and analysts can build acceptance for the project. Disadvantages to interview include: time consumed, expense to conduct, and the information given is subject to personal biases and opinions of those interviewed. Questionnaires: The advantages to using questionnaires are: anonymity from respondents can yield candid answers; much information can be obtained in a short time period; they are generally inexpensive; and a questionnaire gives the respondent time to think about answers, which may produce answers of a high quality. Disadvantages include: lack of any follow up or probing on a personal level; since the questionnaire is anonymous, the analyst cannot clarify questions; sometimes questionnaires are viewed as impersonal, and they may often be ignored or not completed carefully. Observation: Advantages of observation include verification of how systems actually work and better understanding of the system. Disadvantages include: time consumed; they are expensive and difficult to interpret, the observed people may alter their behavior. Systems Documentation. The advantages of system documentation are that such documentation may provide a good description of how the system should work, and generally documentation is easy to read. The disadvantages to system documentation are: that it can be time consuming to obtain and analyze; it may not be available or it may be incomplete; and it may not show how system really works if it has not been maintained on a regular basis. 72. There are five major aspects that must be considered during a systems analysis feasibility study. These five aspects of feasibility are technical, operational, legal, scheduling, and economic. Technical feasibility is asking the question of whether the planned system can be developed and implemented using the technology that exists today. Operational feasibility focuses on the question of whether the organization possesses the human resources capable of designing, implementing, and operating the proposed system, and whether people can actually use the system and will use the system. Legal feasibility deals with issues of federal and state law compliance, administrative agency regulations, and any contractual obligations the company may have. The focus of scheduling feasibility is the question of whether the system can be developed and implemented within the time allotted. Economic feasibility tackles questions of whether the system benefits will outweigh the time, money, and resources used to develop it. These questions are by far the most complex to analyze and answer. Capital budgeting models are used to evaluate Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 the costs versus benefits of a system. The capital budgeting techniques of a payback period, the net present value (NPV) of cash flows, and the internal rate of return (IRR) can be incorporated as part of the economic feasibility component of the feasibility study. 73. Personal characteristics and background of the users involved or impacted by the change. The manner in which change is introduced may have greater impact than the actual change itself. Experience with prior changes that went poorly may make employees wary of new anticipated changes. Any lack of top management support may raise an issue of endorsement for such changes. Communication can be a problem when no explanation is given to employees about a change. Biases and natural resistance to change may occur due to emotional attachments to duties or coworkers. Disruptive nature of the change process can place additional burdens on workers. People may have a fear of the unknown and uncertainty about accompanying changes. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 CH 19 MULTIPLE CHOICE 1. Which statement below regarding the development of an AIS is false? a) A newly designed AIS always meets user needs for a time period. b) Changes to the AIS are often difficult to make after requirements have been frozen into specifications. c) The development process can take so long that the system no longer meets company needs. d) Users are unable to specify their needs adequately. 2. In which approach to systems acquisition is "inexpensive updates" considered an advantage? a) b) c) d) canned software custom software modified software turnkey software and systems 3. When canned software is used for systems acquisition, the conceptual design phase of the SDLC a) b) c) d) involves a make-or-buy decision. is combined with the physical design phase. is eliminated. is the same. 4. When canned software is used for systems acquisition, the physical design phase of the SDLC a) b) c) d) does not involve designing and coding although modifications may be made. is combined with the conceptual design phase. is eliminated. is the same. 5. When canned software is used for systems acquisition, the implementation and conversion phase of the SDLC a) b) c) d) does not involve the documentation step. does not require the company to have trained IS personnel. does not require the develop and test software step. both A and C above 6. When canned software is used for systems acquisition, the maintenance aspect of the operations and maintenance phase of the SDLC a) b) c) d) is more costly. is not necessary and is eliminated. is usually the responsibility of the vendor. requires trained personnel. 7. Software development companies write commercial software that can be used by a variety of organizations. Sometimes these companies combine both software and hardware together to sell as one package. Such a package is commonly referred to as a) a turnkey system. b) a value-added system. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) an application service package. d) canned software. 8. What is a major problem with "canned software"? a) b) c) d) A commercial software development company has developed it. Canned software is sold on the open market to a broad range of users with similar requirements. Canned software may not meet all of a company's information or data processing needs. Canned software may offer easy availability and lower costs. 9. Which statement is true regarding canned software and the SDLC? a) b) c) d) Canned software cannot be modified to meet unique user needs. Companies that buy rather than develop AIS software can still follow the SDLC process. Most canned software meets all of a company's information or data processing needs. The SDLC process does not apply to canned software. 10. The reasons for __________ are to simplify the decision-making process, reduce errors, provide timesavings, and avoid potential disagreements. a) b) c) d) leasing outsourcing prototyping sending out a request for a proposal 11. Total costs are usually lower and less time is required for vendor preparation and company evaluation when requests for proposal are solicited based on a) b) c) d) exact equipment needs. generalized software needs. specific hardware and software specifications. None of the above are correct. 12. Information given to vendors should include a) b) c) d) a budget for software and hardware. detailed specifications for the AIS. timeframe required for completion of the project. None of the above are correct. 13. The approach that evaluates vendors' systems based on the weighted score of criteria and points totaled is called a) b) c) d) benchmark problem. point scoring. prototyping. requirements costing. 14. The approaches to evaluating proposals that do not incorporate dollar estimates of costs and benefits is known as a) b) c) d) benchmark problem and point scoring. point scoring and requirement costing. requirement costing and point scoring. All methods mentioned above include dollar estimates. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 15. It is important for a company to be selective in choosing a software vendor. When a company buys a large or complex system, it may request that a software vendor submit a specific proposal for a system by a specified date. What acronym is used to identify such a request? a) b) c) d) ASP EIS ISP RFP 16. A request for proposal sent to software vendors is an important tool since it can reduce errors. Which statement below supports this reason? a) b) c) d) All responses are in the same format and based on the same information. Both parties possess the same expectations and pertinent information is captured in writing. The chances of overlooking important factors are reduced. The same information is provided to all vendors. 17. A company should carefully evaluate proposals submitted by software vendors. What is the first step a company should take in the proposal evaluation process? a) b) c) d) Carefully compare proposals against the proposed AIS requirements. Determine how much of a given proposal meets the desired AIS requirements. Eliminate proposals that are missing important information or fail to meet minimum requirements. Invite vendors to demonstrate their systems. 18. Among the methods a company can use to help it evaluate software and hardware systems from vendors, one way is to calculate and compare the processing times of different AIS to compare system performance. This is the __________ method. a) b) c) d) benchmark problem mandatory requirements point scoring requirements costing 19. What is a drawback to using the requirements costing method of software and hardware evaluation? a) b) c) d) Dollar estimates of costs and benefits are not included. Intangible factors such as reliability and vendor support are overlooked. The weights and points used are assigned subjectively. There is no drawback to using the requirements costing method. 20. The costly and labor-intensive approach to systems acquisition is a) b) c) d) canned software. custom software. modified software. turnkey software. 21. The least costly approach to systems acquisition is a) b) c) d) canned software. custom software. modified software. prototyping. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 22. Which of the following is not appropriate for end user development? a) b) c) d) performing statistical analyses preparing schedules and lists retrieving information from databases updating database records 23. What is the basic function of a help desk? a) b) c) d) develop and implement standards and control data provide hot line assistance and serve as a clearinghouse of information train end users and assist with application development All of the above are basic functions of a help desk. 24. Despite the fact that many good canned software packages are available to organizations today, many organizations develop their own software. What is a reason for such in-house development? a) b) c) d) an organization may have unique requirements canned software packages are often less expensive than software developed in house the organization's size and complexity necessitates the in-house development of software A and C above are correct. 25. Another alternative to buying a canned system or in-house development is to have a third-party vendor develop a custom system. Which guideline below should not be used by the organization to select an outside developer for a custom system? a) The outside developer should have an in-depth understanding of how the company conducts its business. b) The outside developer should have experience in the company's industry. c) The outside developer should possess a good understanding of business in general. d) The outside developer that charges the least for the system should be chosen over others. 26. A company must carefully evaluate each alternative of developing in-house software, buying canned software, or using an outside third party when planning an AIS. Which statement below is true regarding such a decision? a) Generally the best overall decision is to buy a canned software and hardware system. b) The most efficient and effective systems are the ones developed in house. c) Using an outside third party to develop a system always gives the organization a significant competitive advantage. d) There is no single right answer to the build-or-buy decision. 27. Since the introduction of the computer, there has been an astronomical demand for information systems. Such demand has resulted in many users becoming involved in the hands-on development, control, and employment of information systems. What term is used to refer to this phenomenon? a) b) c) d) amateur user computing (AUC) competitive intra-organization systems development approach (CIOSDA) end-user computing (EUC) novice information systems development (NISD) Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 28. End-user development is inappropriate for some types of systems. What is an example of a system that end users should not be allowed to develop? a) b) c) d) a payroll processing program a program that performs "what-if" statistical modeling developing an application using prewritten software such as a spreadsheet or database system preparing a schedule or list such as a depreciation schedule 29. What is an important risk to be considered when allowing end users to develop a system? a) b) c) d) IS resources are freed up for other tasks systems are implemented that have not been adequately tested systems are usually easy to use and modify users control development process and decide what systems are created and implemented 30. What is an important benefit to be considered when allowing end users to develop a system? a) b) c) d) systems are developed when they are needed systems are more likely to be incompatible with other systems within the organization systems are more likely to be inefficient systems are often poorly controlled and documented 31. A help desk can encourage, support, coordinate, and control end-user activities. A help desk department may be organized with front-line and second-line analysts and technicians. What would be one duty of second-line help desk personnel? a) b) c) d) handling complicated queries requiring research provide callers with scripted answers using expert systems to quickly find answers None of the duties listed above pertain to second-line help desk personnel. 32. The practice of hiring an outside company to handle all or part of the organization's data processing activities is called a) b) c) d) outsourcing. prototyping. reengineering. turnkey system. 33. How does outsourcing improve an organization's utilization of assets? a) by allowing a company to completely eliminate its IS department, which will reduce its payroll costs b) by allowing the company to sell assets to outsourcers and improve their cash position c) by eliminating the expense of keeping up with the latest technology and, thus, eliminate the drain on cash reserves d) Both B and C above are correct. 34. Which of the following is not a benefit of outsourcing? a) b) c) d) access to greater expertise and more advanced technology greater control improved development time lower costs Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 35. A company that has outsourced its AIS function can lose a fundamental understanding of its AIS needs and the strategic uses of AIS with the passing of time. What is this risk called? a) b) c) d) locked-in system loss of control reduced competitive advantage unfulfilled goals 36. The success of large corporations that use outsourcing for their information system requirements has motivated other organizations to consider outsourcing. Which advantage of outsourcing, given below, may tend to cause resistance on the part of inhouse IS staff and other organization employees? a) b) c) d) Outsourcing allows a company to better use its assets and scarce resources. Outsourcing can lower a company's overall IS costs. Outsourcing facilitates downsizing. Outsourcing helps eliminate the peaks and valleys of system usage. 37. What is a disadvantage of an organization's outsourcing of information systems? a) b) c) d) Many outsourcing goals and benefits are never realized. Outsourcing may result in faster and more efficient systems development. Outsourcing provides access to greater expertise. Outsourcing provides access to more advanced technology. 38. There are certain risks associated with outsourcing. One possible risk is the exposure of the sharing of confidential data with unauthorized parties. This risk can be placed into the category of a) b) c) d) a locked-in system. a loss of control. a reduced competitive advantage. inflexibility. 39. Which of the following statements about reengineering is inaccurate? a) b) c) d) The data should be centralized and then dispersed throughout the company. The information should be processed by those who use it. The organization should be based on the different tasks that make up the processes. The processes should be performed by output users. 40. Which business process reengineering principle is applied when the traditional approvals for routine purchases are removed and replaced by users placing the orders themselves? a) b) c) d) have output users perform the process have those who produce the information process it integration of parallel activities organize around outcomes, not tasks 41. Developing and putting teams in charge of products is an application of which business process reengineering principle? a) have output users perform the process b) have those who produce the information process it Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) integration of parallel activities d) organize around outcomes, not tasks 42. What factor underlies the seven principles of reengineering? a) b) c) d) advances in management practices efficient and effective use of information technology global competition the work flow software 43. Which of the following would not be considered a challenge when implementing business process reengineering efforts? a) b) c) d) availability of mainframe computer hardware and software cost risk skepticism 44. A sobering fact is that even though a trillion-plus-dollars has been spent on information technology in the last decade, productivity has not increased significantly. One change suggested to improve performance dramatically is to analyze thoroughly and completely redesign business processes and information systems. What is such a change called? a) b) c) d) a CSC Index business process reengineering end-user development information system outsourcing 45. There are seven major principles of business process reengineering (BPR). One principle states that whenever possible, one person should be given responsibility for the entire process. What is the name given to this principle? a) b) c) d) capture data once, at its source centralize and disperse data integrate parallel activities organize around outcomes, not tasks 46. One of the principles of business process reengineering is to centralize and disperse data. How is this principle defined? a) b) c) d) certain processes can be performed in parallel and integrated at the end data is entered once in an on line database and made available to all who need it existing job descriptions and departmental boundaries are eliminated information technology can maintain a centralized database, while telecommunications technology can disburse data to necessary locations 47. Business process reengineering (BPR) can be a challenging venture for all involved. Many reengineering efforts fail or fall short of the goals to be achieved in the process. Which statement below applies to the BPR obstacle of controls? a) Nonbelievers and cynics who say a BPR cannot be done should be controlled during all phases of the effort. b) Reengineering efforts should not eliminate the separation of duties without implementing compensating controls. c) Throughout the process managers must continually reassure, persuade, and control those affected Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 by the BPR so that the necessary changes will work. d) None of the statements apply to the BPR principle of controls. 48. The basic premise of __________ is that it is easier for people to express what they like or dislike about an existing system than to imagine what they would like in a system. a) b) c) d) modified software outsourcing agreements prototyping turnkey systems 49. What is an advantage of prototyping? a) b) c) d) It is a less efficient use of system resources. It may be inadequately tested and documented systems. The developer need not maintain or update the system. There are negative behavioral reactions. 50. Which statement below regarding prototyping is false? a) A prototype is considered a "first draft," which is quickly and expensively built for testing purposes. b) Developers who use prototyping still go through the SDLC. c) It is easier for people to express what they like or dislike about a prototype than to imagine what they want in a system. d) Prototyping allows developers to condense and speed up parts of the analysis and design phases. 51. There are four steps involved in developing a prototype. Which step emphasizes speed and low cost rather than efficiency of operation? a) b) c) d) first second third fourth 52. What is the emphasis of the first step involved in developing a prototype? a) b) c) d) develop a good prototype into a fully functional system speed and low cost rather than efficiency of operation users identify changes to be made in an iterative process what output should be produced rather than how it should be produced 53. A prototype that is turned into a fully functional system is referred to as a(n) a) b) c) d) disappearing prototype. nonoperational prototype. operational prototype. throwaway prototype. 54. The development of which type of system listed below would not benefit from the creation of a prototype? a) b) c) d) decision support systems executive information systems expert systems systems that cross a number of organizational boundaries Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. What is a disadvantage to prototyping? a) b) c) d) developers may shortchange the testing and documentation process errors are likely to be detected and eliminated early in the development process prototyping may be less costly than other approaches prototyping usually produces a better definition of user needs than other approaches 56. CASE stands for a) b) c) d) computer-aided software engineering. computer-aided systems engineering. both A and B none of the above 57. Which is not a problem with CASE technology? a) b) c) d) cost incompatibility lack of system documentation unmet expectations 58. Computer-aided software (or systems) engineering is another tool used for improving the development process. What is one thing that CASE tools were not designed to do in assisting in the software and systems development process? a) b) c) d) automate important aspects of the software development process enhance the efforts of managers in understanding information needs plan, analyze, design, program, and maintain an information system replace skilled designers 59. What is a disadvantage of using CASE? a) b) c) d) cost savings improved control procedures improved program quality incompatibility 60. What is an advantage of using CASE? a) b) c) d) incompatibility replacement of skilled designers simplified documentation unmet expectations SHORT ANSWER 61. Briefly identify the difficulties encountered when developing an AIS. 62. What are the three methods of obtaining software? What is a turnkey system? 63. What are the guidelines for successfully purchasing custom software when using an outside vendor? 64. What is a help desk? What are the uses of a help disk? 65. What is outsourcing? What are the different types of outsourcing agreements? 66. What is business process reengineering? What are the principles of reengineering? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 67. What is computer-aided software (or systems) engineering (CASE)? What are the advantages and disadvantage of CASE technology? 68. Explain the concept of an application service provider. 69. What are the key things an organization can do to enhance an RFP to be sent to vendors? 70. Briefly discuss how an organization can develop custom software. ESSAY 71. What are the relative advantages and disadvantages of custom software and canned software for meeting application software needs? 72. What is end-user computing? Why has end-user computing seen explosive growth? What are the advantages and risks of end-user computing? 73. What is prototyping? When is prototyping appropriate? What are the steps involved in prototyping? Discuss the advantages and disadvantages in prototyping. 74. Discuss how information system outsourcing can provide the organization with both a business solution and asset management. 75. Explain the business processing reengineering principle: "Require those who produce information to process it." Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. A 2. A 3. A 4. A 5. D 6. C 7. A 8. C 9. B 10. D 11. D 12. B 13. B 14. B 15. D 16. C 17. C 18. A 19. B 20. B 21. A 22. D 23. D 24. D 25. D 26. D 27. C 28. A 29. B 30. A 31. A 32. A 33. D 34. B 35. C 36. C 37. A 38. B 39. C 40. A 41. C 42. B 43. A 44. B 45. D 46. D 47. C 48. C 49. C 50. A 51. B 52. D 53. C 54. D Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. A C C D D C Demand for development resources is very high and can backlog AIS projects for several years. The development process can be lengthy. System developers may not understand the company's business, and consequently the new system may not always meet user's needs. The time taken to develop an AIS may make it obsolete when the new system is ready to launch. Users may not be able to articulate their demands adequately, and therefore they may be dissatisfied with the finished product. Changes to the AIS are difficult to make beyond a certain point, so the AIS remains in a state of "perpetual development" and flux . The three methods of obtaining software are purchasing new software, developing software inhouse (either by development staff or by the system end-users themselves), or hiring an outside company to create a system. A turnkey system is a software and hardware package, which is complete and ready to be used "at the turn of a key." Vendors for turnkey systems primarily specialize in a particular industry. Guidelines when contracting with a third-party company: Carefully select a developer by checking into references and inquiring about reputation and past experiences from other organizations. Sign a contract with clearly defined areas of responsibility for the vendor. Plan and monitor each step by designing each step of the project in detail, and making frequent checkpoints for monitoring the project. Maintain effective communication between the company and the developer. Control all costs and minimize cash outflow until the project has been completed and is accepted A help desk consists of analysts and technicians that encourage, support, coordinate, and control end-user activities. Some of the duties and activities of the help desk includes the following: Hotline assistance to solve problems. Clearinghouse for information, coordination, and assistance. Training, maintenance, and support center for the software and hardware. Application development assistance center. Approval point for development and implementation standards for hardware and software purchases, documentation and application testing, and security issues. Controlling access to corporate data by using access matrix controls, etc. Evaluating new end-user hardware and software products. Outsourcing is the hiring of an outside company to handle all or part of a company's data processing activities. There are two main types of outsourcing agreements: Mainframe outsourcing is when the outsourcer buys the client's equipment, hires the client's employees, and operates on the client's site or connects the system to outsourcer's computer. Client/server or desktop outsourcing is when a particular service, segment of business, function, or PC support is outsourced. Business process reengineering is a thorough analysis and complete redesign of business processes and information systems to achieve dramatic performance improvements. Business process reengineering focuses on why the business processes are performed and not on how they are performed. The seven basic principles of reengineering are: Organize around outcomes, not tasks. Have output users perform the process. Have those who produce information process it. Centralize and disperse data. Integrate parallel activities. Empower workers, use built-in controls, and flatten the organizational chart. Capture data once, at its source. CASE refers to an integrated package of computer-based tools that automate important aspects of the software development process. CASE tools can be used to plan, analyze, design, program, and maintain an information system. CASE tools do not replace skilled designers, but they provide effective support for all phases of the SDLC. Advantages-- Improved productivity, improved program quality, cost savings, improved control procedures, and simplified documentation. Disadvantages -- Incompatibility, cost, and unmet expectations An application service provider (or ASP) is a third-party provider of software to organizations. An ASP is Web-based, providing delivery of software to its clients over the Internet. An organization that uses an ASP "rents" the software, thus eliminating the tasks of buying, installing, and maintaining the software. Among the advantages to using this approach as opposed to the outright purchase of software is a reduction of software costs and administrative overhead, Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 69. 70. 71. 72. 73. 74. automated software upgrades, scalability as the organization itself grows, global access to information, access to skilled IT personnel, and ability to focus on core competencies rather than IT requirements. The more information an organization provides in its RFP, the better its chances are of receiving a system that meets its requirements. It is important to include detailed specifications for the new AIS, including required applications, inputs, outputs, files, databases, frequency and ways of updating files and creating queries, and any unique characteristics or requirements. It is also essential that the RFP distinguishes between what are mandatory requirements and what are "desirable but not essential" requirements. Custom software is usually developed and written in house. Albeit a difficult, error prone, and time- consuming process, many organizations develop their own software because their requirements are unique or their size and complexity necessitate the creation of a custom package. As an alternative, third-party developers can be enlisted to develop custom software for an organization. Custom software should only be developed when it results in a distinct, competitive advantage to the organization. Custom software: tailored to needs; potential competitive advantage; and better control over the process: expensive; difficult to write; error prone; and time consuming. Canned software: easy to acquire; fast to acquire; inexpensive; good documentation; updates are inexpensive; and can be tested: not tailored to needs; not as efficient as custom software; does not develop in-house expertise in creation; and developer may go out of business. End-user computing is the hands-on development, use, and control of computer-based information systems by users. The suitable applications are: Producing simple reports and answers to one-time queries by accessing the company database. Sensitivity, statistical, or "what-if" analysis. Using spreadsheets or data base software to analyze data. Preparing schedules and lists such as depreciation schedule, accounts receivable aging, and loan amortizations. User computing has seen an explosive growth because: Users realized that computers can be used to meet more and more information needs. Increased access to data created many new uses and needs for information. One prediction is that end-user computing may account for 75% to 95% of all information processed in the near future. Advantages of end-user computing: The user is involved in the creation, control, and implementation of the software; systems tend to meet user needs; programs can be created timely; end-users creating programming can free up IS resources; and programs tend to be versatile and easy to use. Disadvatages of end-user computing: Logic and development errors; inadequately tested applications; inefficient systems; poorly controlled and documented systems; systems incompatibilities; duplication of systems and data; and wasted resources and increased costs. Prototyping is the development of a simplified working model (prototype) of an information system. It is a "first draft," that is quickly and inexpensively built and provided to users for testing. Prototyping is appropriate if: There is uncertainty about the existing AIS. The questions to ask are unclear. The final AIS is not clearly visualized. Speed is an issue. There is a high likelihood of failure. The system is a decision support system, executive information system, expert system, or information retrieval system. Suitable when the system involves experimentation and trial-and-error development. Suitable when the system requirements evolve as the system is used. Prototyping is not appropriate if: The system is large or complex and serves major organizational components or crosses a number of organizational boundaries. Steps in developing a prototype: Identify basic system requirements based on users' needs for what output should be produced. Develop initial prototype emphasizing speed and low cost instead of efficiency of operation and demonstrate it for users. Make changes needed as identified by users, may take several iterations. Develop and use the user-approved system. Advantages of prototyping: Better definition of user needs. Higher user involvement and satisfaction; faster development time; fewer errors; more opportunity for changes; and less costly to the organization. Disadvantages of prototyping: significant user time; less efficient use of system resources; incomplete system development; inadequately tested and documented systems; negative behavioral reactions; neverending development. Many companies have come to view information system outsourcing as not merely an IS solution but a true business solution. Outsourcing has become a plausible business solution because it allows the organization to focus and put its concentration into its core competencies. This transfer Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 of IS responsibilities can be liberating to the organization, as it frees up more resources to devote to the mainstay of its business efforts. The viewpoint is that a company should be allowed to do what it does best; so the outsourcer is better at IS operations and management, while the organization is better in its areas or core competencies. Many organizations treat outsourcers as business partners, working closely to meet the strategic business objectives of the organization. An additional benefit of IS outsourcing is asset management. Many organizations tie up millions of dollars in their IS efforts, and the attempt to keep up with technological improvements can create a steady drain on cash reserves and other organizational resources. One way to significantly improve an organization's cash position and reduce annual expenses is to sell off IS assets, or lease them to the outsourcing organization. This can have positive benefits for both the organization and outsourcing vendor as well, as it helps the organization with cash and expense management, and can provide an outsource vendor with the equipment (and even people) it needs to properly service its client. 75. The idea behind this BPR principle is to save time, money, and other resources. By having the people who produce the information also be responsible for its processing, a more efficient and effective business process is created. As an example, with the reduced cost of PC technology, LANs, and WANs, it is feasible for purchasing agents to create and process their own purchase orders on-line by entering them into a database. A vendor using EDI can ship goods to a customer but does not have to send a physical invoice. When the goods arrive at the customer's warehouse, a receiving clerk can check in the goods by scanning bar codes found on each item. The system will automatically check the goods received against the electronic information sent from the vendor, and if goods received match the order, the system can automatically prepare a check and forward the appropriate information to the accounts payable department for approval. The net result is that fewer people perform more automated tasks due to their immediate input of information into the system. There is also less paper in the process. Ultimately, the organization can process orders more quickly, at lower cost, and provide better customer service all at the same time. Hence, there is a significant saving of money and time by having the people who produce the information also be responsible for its processing. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 Chapter 20 MULTIPLE CHOICE 1. What is one activity that is not one of the responsibilities of accountants to help keep a project on track? a) b) c) d) ensuring that the project is on schedule evaluating and measuring benefits helping programmers write code monitoring costs 2. Developing a general framework for implementing user requirements and solving problems identified in the analysis phase occurs in which phase of the SDLC? a) b) c) d) conceptual systems design implementation and conversion operations and maintenance . physical design 3. Who is responsible for identifying and evaluating a variety of design alternatives? a) b) c) d) design team implementation committee steering committee systems analysts 4. Who is responsible for evaluating the design alternatives and selecting the one that best meets the organization's needs? a) b) c) d) design team implementation committee steering committee systems analysts 5. Which of the following lists represent the sequence of elements in developing the conceptual design specifications? a) b) c) d) input, data storage, processing procedures and operations, and output input, output, data storage, and processing procedures and operations output, data storage, input, and processing procedures and operations processing procedures and operations, input, data storage, and output 6. The project team wants to find the most efficient way to collect data in order to prepare a report on sales per store. Which element in design specifications will deal with the decision? a) b) c) d) data collection input output processing procedures 7. One of the purposes of the __________ is to guide physical systems design activities. a) b) c) d) conceptual systems design report physical systems design report program design systems analysis report Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 8. The conceptual design phase is the second phase in the systems design life cycle. There are several steps in this phase. Which step listed below is not a valid step made in the second phase of the SDLC? a) b) c) d) evaluate design alternatives physical systems design prepare a conceptual systems design report prepare design specifications 9. A part of the conceptual design phase is the evaluation of design alternatives. The design team should identify a variety of design alternatives and evaluate them based on several standards. Who is responsible for approving the final design that best meets the organization's needs? a) b) c) d) IS management the end-users of the system the steering committee the system analyst design team 10. Once a design alternative has been chosen, the project team is responsible for the development of several conceptual design elements. A decision about how often to produce a certain report falls under the category of which design element? a) b) c) d) data storage input output processing procedures and operations 11. At the end of the conceptual design phase the development team prepares a conceptual systems design report. What item below is not considered a rationale for issuing the report? a) b) c) d) it can be used to guide physical systems design activities it communicates how management and user information needs will be met it discusses the design alternatives that were not selected for the project it helps the steering committee assess system feasibility 12. The objective of __________ is to determine the nature, format, content, and timing of printed reports, documents, and screen displays. a) b) c) d) input design output design report design None of the above are correct. 13. Which consideration below is not considered important to output design? a) b) c) d) format location medium source Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 14. All of the four categories of output have pre-specified content and format except for a) b) c) d) demand reports. scheduled reports. special-purpose reports. triggered exception reports. 15. In the file and database design step of the physical systems design phase, it is advantageous to have a) b) c) d) a compatible format. easy access. timely queries. various capabilities. 16. In evaluating input design, the design team must identify a) b) c) d) a single view so data can be shared. organization and access. types of data input and optimal input methods. what is relevant, complete, and useful. 17. Program development can be improved by a) b) c) d) having special codes for input, output, and file maintenance. having users code the programs. using standards to find incorrect logic errors, omissions, or other problems. using structured programming. 18. Structured programming divides the program into small, well-defined modules. Which of the following statements below is correct? a) b) c) d) Modules interact with each other directly and also through the control module. Modules interact with each other directly. Modules interact with only the control module. Modules primarily, but not always, interact with the control module. 19. Rules for writing programs are called a) b) c) d) applications. basic code. common routines. programming standards. 20. Everyone who interacts with the newly designed AIS should follow __________ that answer the who, what, where, why, and how questions related to all AIS activities. a) b) c) d) procedures programs standards none of the above Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 21. Which consideration is not of concern in controls design? a) b) c) d) security alphabetical control audit trail validity 22. The accountant wants to make sure that all cash disbursements are made only to legitimate vendors. Which of the following control considerations will deal with this concern? a) b) c) d) security accuracy authorization validity 23. The sales department wants to make sure that all customer inquiries are answered in real-time. Which of the following controls design considerations will deal with this concern? a) b) c) d) security authorization accuracy audit trail 24. At what point in the systems development life cycle does the company determine how the conceptual AIS design is to be implemented? a) b) c) d) the conceptual design phase the implementation and conversion phase the physical design phase the systems analysis phase 25. The physical design stage of the SDLC is the point at which the broad, user-oriented AIS requirements of conceptual design are translated into detailed specifications that are used to code and test the various computer programs. What is the most timeconsuming activity found in this phase, or even in the entire SDLC process? a) b) c) d) controls design input design output design program design 26. Which consideration listed below applies to file and database design? a) b) c) d) form size format medium organization and access 27. Control design considerations are important to the physical systems design phase of the SDLC. One concern of control design relates to the pre-numbering of documents to prevent errors or intentional abuse. What is the control design consideration related to this concern? a) accuracy Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 b) audit trail c) numerical control d) validity 28. __________ is the process of installing hardware and software and getting the AIS up and running. a) b) c) d) Conceptual design Physical design Systems analysis Systems implementation 29. The first step in developing software is to a) b) c) d) determine user needs. develop a plan. hire program users. write program instructions. 30. The initial visual and mental review to discover keying or programming errors is called a) b) c) d) desk checking. desk correction. desk debugging. desk imaging. 31. Flowcharts, record layouts, decision tables, and related items are part of a) b) c) d) determining user needs. documenting the program. testing the program. training program users. 32. Effective AIS training involves a) b) c) d) instruction on new hardware and software. orientation to new policies and operations. planning and scheduling so it occurs before system testing and conversion. All of the above are correct. 33. Step-by-step reviews of procedures or program logic early in the system design that focus on inputs, files, outputs, and data flows are called a) b) c) d) acceptance tests. operating tests. processing of test transactions. walk-throughs. 34. The implementation planning and conversion phase of the SDLC incorporates many systems implementation elements. One such element is the development and testing of software programs. One process used to uncover and eliminate program errors is known as a) black box testing. b) debugging. c) desk checking. Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 d) white box testing. 35. What is used as the basis for management to make a "go/no go" decision regarding whether to proceed from the physical design phase to the implementation planning and conversion phase of the SDLC? a) b) c) d) a conceptual system design report a physical systems design report a systems design report an implementation planning design report 36. An implementation plan consists of the various implementation tasks to be accomplished along with a variety of other data and information, such as expected completion dates, cost estimates, and identification of the individuals responsible for each task. The plan should also address the area of risks to successful implementation. Who is responsible for identifying such risk factors? a) b) c) d) the implementation team the steering committee the systems analysis team the systems development team 37. Within the implementation planning and conversion phase of the SDLC, analysts must __________ before they can __________. a) b) c) d) complete documentation; test software programs install and test software; test software programs test software programs; test the system test the system; select and train personnel 38. A software program must be changed to accommodate new tax rate values. What is the name of the process used to make such a change? a) b) c) d) debugging desk checking program maintenance programming 39. Several types of documentation must be prepared for a new system. The type of documentation that includes operating schedules and file retention requirements is called a) b) c) d) development documentation. operations documentation. reference documentation. user documentation. 40. Inadequate testing can lead to serious systems failures. Part of the SDLC process is to adequately test the system being implemented. What is the type of test that determines whether a program is operating as desired? a) b) c) d) acceptance testing debugging processing of test transactions program walk-through Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 41. What is the name for the type of testing where copies of real transaction and file records are used rather than hypothetical ones? a) b) c) d) acceptance testing debugging desk checking program walk-through 42. In __________, old and new systems are operated simultaneously at different parts of the organization. a) b) c) d) direct conversion parallel conversion phase-in conversion pilot conversion 43. A company wishes to introduce and test a new AIS at a branch location before company-wide adoption. This approach is called a) b) c) d) direct conversion. parallel conversion. phase-in conversion. pilot conversion. 44. Which of the following activities does not pertain to the area of data conversion? a) b) c) d) changing the data content changing the database changing the file format moving files to a new medium 45. "Conversion" in the implementation planning and conversion phase of the SDLC is the task of changing from an old system to a new system. What is the name for the type of conversion where the old AIS is immediately terminated as the new AIS is introduced? a) b) c) d) direct conversion parallel conversion phase-in conversion pilot conversion 46. What is a phase-in conversion? a) b) c) d) both the old and new AIS are operated simultaneously elements of the old AIS are replaced gradually with elements of the new AIS the new AIS is introduced into one part of the organization, such as a branch the old AIS is terminated as the new AIS is introduced 47. The data conversion process of the implementation planning and conversion phase of the SDLC can be a tedious and time-consuming task. Data files may need to be modified in any of several ways. What is an example of modifying the medium of data files? a) adding or deleting fields or records b) changing from tapes to disks Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 c) changing the file format d) changing the storage capacity of the file format 48. There are several steps in the data conversion process that must take place in a certain sequence. What is the last step in this process? a) b) c) d) actual data conversion checking the files for completeness and removing any data inaccuracies or inconsistencies documentation of conversion activities monitoring of the system after the actual data conversion 49. Which factor is not investigated during the post-implementation review? a) b) c) d) accuracy benefits completion costs 50. The final step in the SDLC is that of the operation and maintenance of the new system. What is the final activity in the systems development process? a) b) c) d) monitoring of the system ongoing maintenance activities preparation of the post-implementation review report user acceptance of the post-implementation review report 51. Some investigation must occur during the postimplementation review process to prepare the report and wrap-up systems development activities. An analyst who asks the question, "Does the system produce actual and complete data?" is investigating what postimplementation factor? a) b) c) d) accuracy compatibility goals and objectives reliability SHORT ANSWER 52. How can accountants help in the SDLC process? 53. What factors does a steering committee consider when evaluating different system designs? 54. What is the purpose of a conceptual systems design report? 55. What are the controls design considerations in a new AIS? 56. What is systems implementation? How do you plan for it? 57. What are the different types of documentation that should be prepared for a new system? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 58. What are the different methods of testing a system? 59. What is a post-implementation review? What are the activities involved in a postimplementation review? 60. What output design considerations should be analyzed as part of the physical system design phase? 61. Briefly discuss structured programming. ESSAY 62. What is the conceptual systems design phase? What are the elements of conceptual design specifications? 63. What is the objective of output design? What are the output design considerations? What are the various categories of outputs? 64. What are the different approaches to system conversion? 65. Discuss controls design considerations in the physical systems design phase of the SDLC. 66. What are the eight basic steps used to develop and test software programs? Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 ANSWER KEY 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. C A A C C B A B C C C C D C A C D C D A B D D C D B&C C D A A B D D B B A C C B C A B D B A B B C C D A Accountants must first understand the development process, and then realize that they can make a valuable contribution to the development process in several ways. As users, accountants can Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. specify their needs and help explain such needs to the development team. As members of the development team, they can provide valuable input throughout the design and development process. As auditors, they can perform attest functions with a greater working knowledge and enhanced skill sets. Accountants should keep the project on track by evaluating and measuring benefits, monitoring costs, and helping to maintain the timetable. How well does the design meet organizational and systems objectives? How well does the design meet users' needs? How economically feasible is the design in terms of costs versus benefit? What are the advantages and disadvantages of the design? Do the advantages outweigh the disadvantages? The purpose of this report is to a) guide physical systems design activities, b) communicate how management and user information needs will be met, and c) help the steering committee assess system feasibility. Controls design ensures the effectiveness, efficiency, and accuracy of the AIS. Accountants have a vital role in this area. The important concerns to be addressed are: validity of transactionsauthorization of input, storage, and output activities- accuracy of input and processing activitiessecurity access to system numerical control pre-numbering and accounting of all documents. Audit trail - tracing of transactions from source documents to final output and vice versa Systems implementation is the process of installing hardware and software and getting the AIS in place and in use. Systems planning consists of: Implementation tasks and person(s) responsible for tasks. Setting expected completion dates. Cost estimates and variances. Identify risk factors that decrease likelihood of successful implementation. Strategies for coping with risk factors. Complete documentation - three types of documentation must be prepared: Development documentation which includes: System description. Copies of output, input, and file and database layouts. Program Flowcharts. Test results. User acceptance forms. Operations documentation includes: Operating schedules. Files and databases accessed. Equipment security and file retention requirements. User documentation includes: Procedures manual(s). Training materials. There are three methods: walkthroughs, which involve systematic reviews of procedures or program logic at different phases during the SDLC. In the early stages of the design process, the focus is inputs, outputs, and files. In the later stages, the focus is on program logic and structure. Processing test transactions to determine whether a program operates as designed. Different types of hypothetical transactions are processed to see if the controls catch various types of errors. Acceptance tests, which use real transactions and file records. Users develop the acceptance criteria and make the final acceptance or rejection decision. A post-implementation review ensures that the new AIS meets planned objectives. Any problems uncovered during the review are brought to the attention of the management and the necessary adjustments are made. When review is complete, prepare a report. The acceptance of the postimplementation review report by users concludes the systems development process. Control of the AIS now passes on to the data processing department. Two things must be considered regarding system output. First, who will use the output? Why do users need this type of output, and what decisions will be made based on such output? Second, the medium of the output must be addressed. What medium should be used? Should the output be on paper, computer screen, stored as a voice response file, placed on diskette, microfilm, or some possible combinations of these mediums? These are two important considerations that can either "make or break" a system in terms of its successful use. Other considerations are: What format (tale, graph, etc)? Should preprinted forms be used? Where should the output be sent? Who should have access to the output? How often should the output be produced? Lengthy output should be preceded by an executive summary and a table of contents. Structured programming refers to programs that are subdivided into small, well-defined modules with the goal of reducing complexity and enhancing reliability and modifiability. Each module should interact with a control module rather then with each other. Proper structured programming dictates that each module should have only one entry and exit point to facilitate testing and modification. The conceptual systems design phase involves the development of the general framework for implementing user requirements and solving problems identified in the analysis phase. Conceptual design elements include the following elements: Output specifications to meet users' information needs. Data storage specifications based on reports that need to be produced, the manner in which Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com) lOMoARcPSD|12507101 63. 64. 65. 66. data are stored (sequential, random, etc.), the type of database to use, and appropriate field sizes. Input specification after output is identified so that the "when, where, and how" of data input are appropriate for the types of output needed. Processing procedures and operations specifications are determined after the sequencing and processes for input and data storage are known. Output design: The objective is to determine the nature, format, content, and timing of printed reports, documents, and screen displays. Design considerations: Use - who will use, why is it needed, what is needed for use. Medium - paper, screen, diskette. Format - tables, graphs, narratives. Preprinted - e.g., purchase orders, checks. Location - where sent. Access - by whom and to what. Detail - summary, table of contents, headings. Timeliness - how often. Categories of output are: Scheduled reports are prespecified and formatted and prepared regularly. Specialpurpose analyses are not prespecified or formatted, but are prepared when management requests data to evaluate an issue. Triggered exception reports are prespecified and formatted and prepared in event of abnormal conditions. Demand reports are prespecified and formatted and prepared when requested. Direct conversion is used when the old system is of no value or is not comparable to the new system. This type of conversion carries a high risk of failure. Parallel conversion protects the company from error, but it is costly and stressful to process transactions twice. Phase-in conversion results in gradual changes over time that also allows resources to be acquired over time. However, creating temporary interfaces is costly and gradual changes take time and come at greater expense. Pilot conversion implements the system in just one part of the organization that allows problems to be corrected before the system is completely adopted. However, the costs of interfaces and running both systems are a disadvantage. There are several controls design considerations to be addressed in this phase of the SDLC. Validity, authorization, accuracy, access, numerical control, and providing an audit trail are the major items, which must be taken into account in physical design. Validity would address a question such as, "Are all system interactions valid?" Authorization could be examined by asking, "Are input, processing, storage, and output activities authorized by the appropriate managers?" Accuracy can be analyzed by asking, "Is input verified to ensure accuracy and what controls are in place to ensure that data passed between processing activities is not lost?" When dealing with access issues, the analyst should ask if there is adequate control over accessing data, and ask the important question, "How is a hacker denied access to a data file?" Asking the question, "Are documents pre-numbered to prevent errors or intentional abuse?" can provide insight about numerical controls. Finally, to provide appropriate audit trails, the analyst should ask the question, "Can transaction data be traced from source documents to final output, and vice versa?" It is imperative that controls design be properly implemented in this phase of the SDLC to ensure the success of launching the system and its ongoing use. Also , availability and integrity. Generally speaking, developers use an eight-step method to develop and test software programs. As part of the systems implementation phase of the SDLC, it is important that these steps faithfully are followed by the development team. 1) The team should consult with users and write an agreement about software requirements as a way to determine user needs. 2) Next, a development plan should be created and documented. 3) The overall approach and major processing tasks should be identified on a high level before proceeding to levels of greater detail. At that point the activity of writing program instructions can begin. 4) After program code has been written, the next step is to test the program. This can be achieved in part through debugging and desk checking, along with other types of testing. 5) The next thing to be done is to document the program, since this will explain how the program works and assist analysts in correcting and resolving errors. 6) Training program users is the beginning of the end of the test phase. Program documentation developed in step five will be used at this time. 7) The seventh step is to install and use the system. At this point the program can be used and program maintenance can take place as needed. 8) Use and modify the system. Revise existing programs (called program maintenance). Downloaded by Nicole Ashley Alvarez (nicoleashleyalvarez@gmail.com)