Uploaded by Luna Valeria

AIS-Quizzes

advertisement
AIS CHAPTER 3 QUIZ
SYSTEM DOCUMENTATION TECHNIQUES
1. The documentation skills that accountants require vary with their job function. However, they should at least be able
to do which of the following?
a. Read documentation to determine how the system works.
b. Critique and correct documentation that others prepare.
c. Prepare documentation for a newly developed information system.
d. Teach others how to prepare documentation.
2. It explains how a system works, including the who, what, why, when, and where of systems.
a. Documents
b. Flowcharts
c. Documentation
d. Diagrams
3. These are the basic elements of a Data Flow Diagram, except:
a. Data Store
b. Process
c. Data Connection
d. Data Flow
4. It uses a pictorial representation to make it easier to understand and explain using a standard set of symbols.
a. Input and Output
b. Symbols
c. Document
d. Flowcharts
5. What act was enacted in 2002 that requires management to assess internal controls and auditors to evaluate the
assessment?
a. Credit Information System Act
b. Sarbanes-Oxley Act
c. Electronic Commerce Act
d. Sorley-Oxbey Act
6. A written, step-by-step explanation of system components and how they interact.
a. Documentation
b. Description
c. Descriptive Description
d. Narrative Description
7. A type of flowchart that shows the relationship among the input, processing, and output in an information system.
a. System flowchart
b. Program flowchart
c. Internal Control flowchart
d. Document flowchart
8. A graphical description of the flow of data within an organization, including data sources/destinations, data flows,
transformation processes, and data storage.
a. Data transformation
b. Context Diagram
c. Data Flow Diagram
d. Business Process Diagram
9. Which of the following statements is incorrect?
a. A flowchart is an analytical technique used to describe some aspect of an information system.
b. A flowchart uses a standard set of symbols to describe pictorially some aspect of an information system.
c. A flowchart is drawn using a software program such as Excel, Word, or PowerPoint.
d. A flowchart is a narrative representation of an information system.
10. Which of the following flowcharts shows the flow of document and information between departments or areas of
responsibility?
a. System flowchart
b. Program flowchart
c. Documentation flowchart
d. Document flowchart
11. Which function does the rectangle symbol represent in a flowchart?
a. Manual Operation
b. Database
c. Computer Processing
d. Journal or Ledger
12. What does the circle on a business process diagram represent?
a. Start/Begin
b. Flow
c. Decision
d. Annotation Information
13. The data flow diagram symbol which represents data flows is the
a. Triangle
b. Circle
c. Line
d. Arrow
14. These are the guidelines for preparing Business Process Diagrams (BPD), except one of the following.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. All of the following are guidelines for BPD.
15. Choose among the following is included in the guidelines for preparing flowcharts.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. None of the above choices.
16. It is a visual way to represent the activities in a business process.
a. Business Process Diagram
b. Data Flow Diagram
c. Pyramid Diagram
d. Transaction Diagram
17. A system flowchart depicts the relationship among system input, processing, storage, and ____.
a. Computer
b. Technology
c. Output
d. Program
18. How do flowcharts are represented?
a. By a narrative information
b. By a symbolic shape
c. By a functions
d. By a page
19. Our main topic for today’s discussion is
a. Symbolic Documentation Techniques
b. System Documents Techniques
c. Systematic Techniques
d. Systems Documentation Techniques
20. Which one is not included in our topic's learning objectives?
a. Prepare and use DFD
b. Prepare and use flowcharts
c. Prepare and use input/output
d. Prepare and use BPD
U
u
e1. ____ is a primary key (PK) that uniquely identifies each record in the file.
a. Sales Order Number
b. Pre-printed number
c. Inventory Number
d. Account Number
2. It records the essential details and prepares multiple copies of sales order, which are held for pending approvals.
a. Shipping Department
b. Sales Department
c. Credit Department Approval
d. Warehouse Procedures
3. It is where the clerk reconciles checks and remittance list and prepare deposit slips.
a. Mail Room
b. Data Processing Department
c. Cash Receipts Department
d. AR Department
4. This is to reduce the amount of accounting mistakes but more commonly to reduce the incidence of fraud.
a. Segregation of Duties
b. Transaction Authorization
c. Access Control
d. Supervision
5. Which is not a part of revenue cycle?
a. Revenue Cycle Activities
b. Physical Systems
c. Cash Flows
d. Revenue Cycle Controls
6. It involves using technology to improve the efficiency and effectiveness of a task.
a. Reengineering
b. Interactive System
c. Automation
d. Manual System
7. In what procedure do clerks terminal immediately produces a hard-copy printout of the electronically transmitted
stock release document?
a. Sales Procedures
b. Shipping Procedures
c. Sales Order Procedures
d. Warehouse Procedures
8. It is a recurring set of business activities and related information processing operation associated with providing
goods and services to a customer and the collection of cash and payment for those sales.
a. Revenue Cycle Activities
b. Physical Systems
c. Cash Flow
d. Revenue Cycle
9. It is a shipment receipt when the carrier delivers the goods at a predetermined destination.
a. Shipping Department
b. Shipping Procedures
c. Bill of Lading
d. Warehouse Procedures
10. Both are secondary key (SK) that is neither uniquely identifies sales order records.
a. Account Number and Inventory Number
b. Account Number and Sales Order Number
c. Inventory Number and Sales Number
d. Inventory Number and Sales Order Number
11. It is where the clerk receives and reconciles the remittance advices and list.
a. Mail Room
b. Data Processing Department
c. Cash Receipts Department
d. AR Department
12. It is where the clerk separates the checks and remittance advices and prepares a remittance list.
a. Mail Room
b. Data Processing Department
c. Cash Receipts Department
d. AR Department
13. The primary objective of revenue cycle is to provide the right product in a place at the right time for the right price. T
14. Account number is a pre-printed number on physical source documents. F
15. If credit is approved, the sales department releases copies of the sales order to the billing, warehouse and shipping
department. T
16. One of the advantages of Reengineering with Real- time Technology is. it reduces the amount of paper documents in
the system. T
17. Remittance advices and list must be sent to Cash Receipts Department. F
18. When contents of cash drawer have been reconciled, cash receipts clerk prepares a cash reconciliation form, the first
copy must be recorded to the cash receipts journal.F
19. Reengineering using the internet connects to thousands of potential business partners with formal agreement. F
20. Under the Cash Receipts Department, clerk prepares the journal voucher of total cash received.T
1. What are the five principles that the reliable system satisfies?
A. Security, Access control, Confidentiality, Privacy, Availability
b. Security, Confidentiality, Privacy, Process integrity, Availability
c. Security, Intellectual property, Access control, Privacy, Confidentiality
d. Security, Confidentiality, Privacy, Process integrity,
Encryption
2.) It protects information in transit and in storage
A. Identify & classify information to protect
B. Encryption
C. Access controls
D. Training
3.) It is a principle which has the same control as confidentiality
Privacy
Availability
Security
Access control
4.) The following are the privacy concerns, except
A. SPAM
B. Organizations must carefully follow the CAN-SPAM
guidelines
C. Identify Theft
D. Identification and classification
5.) Manner in which key and text is combined to create scrambled text
A. Key length
B. Privacy
C. Policies concerning encryption keys
D. Algorithm
6.) It is the number of bits (characters) used to convert text into blocks
A. Key length
B. Privacy
C. Policies concerning encryption keys
d. Algorithm
7.) A type of encryption which uses two keys and can create digital signatures
A. Symmetric
B. Asymmetric
C. Hybrid Solution
d. Hashing
8.) A type of encryption which uses one key to encrypt & decrypt
Symmetric
Asymmetric
Hybrid Solution
Hashing
9.) Hash of document that is encrypted using document creator’s private key
Digital Signature
Hashing
Hybrid Solution
Digital Certificate
10. ) If data is encrypted before sending it, a _____ is created.
Virtual Private Network (VPN)
Hybrid Solution
Public Key Infrastructure (PKI)
Digital certificate
11.) It is the correctness of logical relationship between two data items.
Key Verification
Check digit verification
Reasonableness Test
Validity check
12.) Checks accuracy of input data by using it to retrieve and display other related information.
Prompting
Closed-loop verification
Transaction logs
Automatic data entry
13.) Threats to system availability originate from the following sources, except:
Hardware and Software failures
Natural and man-made disasters
Human error
Cross-footing
14.) When using batch processing, the following data entry controls should be incorporated, except:
Transaction logs
Sequence check
Error log
d. Batch totals
15.) Range check tests numerical amount against lower and upper limits. T
16.) Completeness check requires entering key data in twice to verify its accuracy. F
17.) Digital certificate is an electronic document that contains an entity’s public key and certifies the identity of the
owner of that particular public key. T
18.) The following regulations require organizations to protect the privacy of customer information, except: Health
Issurance Possibility and Accounting Act (HIPAA)
19.) The unauthorized use of someone’s personal information for the perpetrator’s benefit.- identity theft
20.) The common number of bits (characters) used to convert text into blocks - 256
1. It is the process of recording financial transactions pertaining to a business.
Auditing
Accounting
Posting
Journalizing
2. Is a system that composed of people and computers that processes or interprets information.
Computerized Information System
Accounting System
Transactions
Auditing
3. A process effected by an entity’s board of directors, management and other personnel, designed to provide
reasonable assurance of the achievement of objectives.
IPO model
Accounting model
COSO model
Audit risk model
4. A situation involving exposure to danger.
Risks
Internal control
Fraud
Error
5. Accounting _____ events systematically to produce reports for the users of the information.
Audits
Records
Journalizes
Summarizes
6. Complete, honest and fair information.
Validity
Integrity
Reliability
Honesty
7. Economic and efficient use of resources and the accomplishment of established goals and objectives.
Compliance audit
Financial Audit
Internal Audit
Operational Audit
8. Is a multi-disciplinary study.
Auditing in a CIS Environment
Accounting
Transactions
CIS
9. Examines the reliability and integrity of financial transactions, accounting records, and financial statements.
Compliance audit
Financial Audit
Internal Audit
Operational Audit
10. Well-grounded, just and relevant.
Validity
Integrity
Reliability
Honesty
11. It is the organizational plan and all related measures to safeguard assets, ensure the accuracy and reliability of
accounting records, promote operational efficiency, and encourage adherence to prescribed managerial policies.
IPO model
Accounting model
COSO model
Internal control
12. the systematic process of obtaining and evaluating evidence regarding assertion about economic actions and events
in order to determine how well they correspond with established criteria.
Validity
Auditing
Reliability
Honesty
13. Is a widely used approach in systems analysis and software engineering for describing the structure of an
information processing program or another process.
IPO model
Accounting model
COSO model
Internal control
14. Compliance Audit determines whether entities are complying with applicable laws, regulations, policies, and
procedures. T
15. Financial Audit examines the reliability and integrity of financial transactions, accounting records, and financial
statements. T
16. Instances that may be outside the control of processors are the following, except;
Information theft
Computer fraud
Information abuse
None of these
17. Objectives of Audit in Computerized Information includes the following, except;
Integrity
Reliabilty
Honesty
None of these
18. Examples of raw data are the following, except;
Assets
Liability
Income
Retained Earnings
19. Is the process of understanding the IT environment, to identify the related IT risks in order to perform appropriate
audit procedures to achieve that ‘assurance’ needed.
Computerized Information System
Accounting
Transactions
Auditing in a CIS Environment
20. The following are the advantages of E-commerce & Electronic Fund Transfers, except;
Convenience
Time consuming
Immediate Payment
Real-time Processing
It is an organized collection of structured information, or data, typically stored electronically in a computer system.
a) Database
b) Data dictionary
c) Logical
d) Database system
These are the advantages of database except:
a) Improved data security
b) Reduced updating errors and increased consistency
c) Damage to database affects virtually all applications programs
d) Greater data integrity and independence from applications programs
It determines if all the requirements of the business have been gathered.
a) Physical
b) Logical
c) Data dictionary
d) Database
What does DBMS stands for?
a) Data management system
b) Data manipulation system
c) Database management system
d) Database manipulation system
These are the disadvantages of database except:
a) Initial training required for all programmers and users
b) Substantial hardware and software start-up costs
c) Damage to database affects virtually all applications programs
d) Greater data integrity and independence from applications programs
This is usually controlled by a database management system.
a) Data Definition Language
b) Database
c) Data dictionary
d) Logical
In designing a database, one must have a _________ of the entire database.
a) Peripheral view
b) Conceptual view
c) Point of view
d) Data view
_______”blueprint” of the structure of database and includes data elements, field types, programs, output, etc.
a) Data Dictionary
b) Database management system
c) Database
d) Database system
What are the three DBMS languages?
a) Data Definition Language, Data Manipulation Language, and Data Query Language
b) Data Definition Language, Database Management Language, and Data Query Language
c) Data Definition Language, Data Manipulation Language, and Data Management Language
d) Database Definition Language, Data Manipulation Language, and Data Query Language
It is a software package designed to define, manipulate, retrieve and manage data in a database.
a) DBMS
b) DDL
c) DML
d) DQL
Data Manipulation Language (DML) used the following commands except:
a) Insert
b) Select
c) Delete
d) Caps Lock
It enables users to retrieve, sort, and display specific data from database
a) DQL
b) DML
c) DBMS
d) DDL
Data Manipulation Language do not change the content in the database
a) TRUE
b) FALSE
It represents the conceptual and external schema as if that “data view” were truly stored in one table.
a) Relational Database
b) Relationship Database
c) Relational Data
d) Relationship Data
Data stored in on large table can be redundant and inefficient causing the following problems except:
a) Update anomaly
b) Insert anomaly
c) Delete anomaly
d) Control anomaly
In relational database design rules, every column in a row must be _______valued
a) Triple
b) Double
c) Single
d) Quadruple
Users may want specific information found in a relational database and not have to sort through all the files to get that
information. So they ______ (ask a question) the data.
a) Query
b) Answer
c) Invoice
d) Research
Reduced data redundancy is one of the advantages of database.
a) TRUE
b) FALSE
What DBMS Language displays the “primary keys”?
a) Data Query Language
b) Data Quality Language
c) Data Definition Language
d) Data Manipulation Language
It deals with how the data will be stored in the database.
a) Physical
b) Logical
c) Data dictionary
d) Database management
1. It is a false representation of a material fact made by one party to another party with the intent to deceive and
to induce the other party to rely on the fact to his or her detriment.
a) Swindling
b) Deception
c) Fraud
d) Concealment
2. In the fraud triangle, it is the only component that a company exercises complete control over.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization
3. A type of fraud that is committed at higher levels usually by Chiefs Executive Officer and Chief Financial Officer.
a) Customer Fraud
b) Management Fraud
c) Vendor Fraud
d) Employee Fraud
4. Below are the example of things that provide incentives for committing fraud, except:
a) Poor tone at the top
b) Personal incentives
c) Bonuses based on a financial metric
d) Investor and analyst expectations
5. Which of the following belongs to the external sources of computer fraud?
a) Skimming
b) Larceny
c) Spoofing
d) Kickback
6. The following are policies to assist in the avoidance of fraud and errors, except:
a) System of Accounting Internal Control
b) System of Information Technology Controls
c) System of Accounting External Control
d) Code of Ethics
7. Its purpose is to inform those acting on behalf of the organization on how they should conduct themselves.
a) Stewardship Obligation
b) Code of Ethics
c) Computer Ethics
d) Internal controls
8. It refers to an employee’s mindset towards committing fraud.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization
9. (Blank) are everything your organization owns including money, money owed to you, equipment, goods,
property or lands, etc.
a) Property
b) Asset
c) Equity
d) None of the above.
10. It refers to the careful and responsible management of something entrusted to one’s care.
a) Leadership
b) Regulation
c) Stewardship
d) Supervision
11. These are the objectives of internal control; except:
a) Reliability of Financial reporting
12.
13.
14.
15.
16.
17.
18.
19.
20.
b) Effectiveness and Efficiency of operations.
c) Compliance with Management Directives
d) Compliance with Applicable Laws and Regulations
This act also added new criminal penalties for violating securities laws.
a) Act of 2002
b) Act of 2001
c) Act of 2004
d) Act of 2003
It is the analysis of the impact of computer technology and the policies for the ethical use of such technology.
a) Code of Ethics
b) Pop Ethics
c) Para Ethics
d) Computer Ethics
It is a multidisciplinary application of ethical theories to computer science.
a) Para Ethics
b) Pop Ethics
c) Theoretical Ethics
d) Theories of Ethics
Ethical behavior is a necessary and a sufficient condition for business success in the long run.
a) True
b) False
This pertains to the principles of conduct that individuals and business manager use in guiding their behavior
and choices.
a) Business Ethics
b) Behavioral Ethics
c) Code of Ethics
d) Decision Ethics
These are the four areas of ethics in business, except:
a) Equity
b) Exercise of corporate power
c) Rights
d) Obligations
The purpose of a code of ethics is to ______ those acting on behalf of the organization on how they should
conduct themselves.
a) Affirm
b) Inform
c) Guide
d) Check
One of the levels of computer ethics where one should have real interest and acquire some skill and knowledge
in the field.
a) Pop Ethics
b) Para Ethics
c) Pare Ethics
d) Paria Ethics
A type of customer fraud.
a) Credit card fraud
b) Vendor Audits
c) Cash Fraud
d) Dos Attacks
1. Upon receipt of the supplier’s invoice, Accounts Payable reconciles all documents, posts to the purchases
journal, and records the _______ in the accounts payable subsidiary ledger.
a. asset
b. liability
c. equity
d. income
2. A clerk prepares a purchase requisition and sends copies to Purchasing and Accounts Payable.
a. True
b. False
3. To what departments do Purchasing department prepares and sends copies of purchase order for each
vendor?
a. Inventory control, Accounts Payable, Receiving (blind copy), and Purchasing Department
b. Purchasing Department, Receiving (blind copy), and Accounts Payable
c. Accounts Payable, Purchasing Department, the vendor and Inventory Control
d. Inventory Control, Accounts Payable, Receiving (blind copy), and the vendor.
4.The Accounts Payable department has now sent copies of the purchase requisition, purchase order, and
receiving report.
a. False
b. True
5. Periodically, the entries in the purchases journal are summarized in a _______ which is sent to the General
Ledger department.
a. Journal voucher
b. General ledger
c. Purchases journal
d. cash disbursements voucher
6. In a manual purchases system, the General Ledger department:
a. reconciles all documents, posts to the purchases journal, and records the liability in the accounts payable
subsidiary ledger
b. receive copies of the purchase requisition, purchase order, and receiving report.
c. reconciles the inventory amount with the account summary received from inventory control
d. all of the above
7. General Ledger also prepares a cash disbursements voucher and posts it in the voucher register.
a. True
b. False
8. The General Ledger department posts from the accounts payable journal voucher to the general ledger.
a. False
b. True
9. The Accounts Payable Department prepares the checks and returns paid vouchers to accounts payable, mails
the check to the supplier.
a. True
b. False
10. _______ are prepared for the general update procedure
a. Journal voucher
b. Cash disbursements voucher
c. Batch totals
d. purchases journal
11. In computer-based expenditure applications for Cash Disbursements the computer performs tasks by:
a. Prints checks for scanned vouchers currently due
b. The system scans for vouchers currently due
c. Records checks in the check register
d. All of the above
12. Advantage of Real-Time Data Input & Processing Over Batch Processing
a. Eliminates much of the routine manual procedures, such as transcribing information onto paper documents
b. validates the voucher records against the valid vendor file
c. calculates batch totals for the general ledger update procedure and then closes the corresponding records in
the open PO file to the closed PO file
d. None of the above
13. In manual accounting records, there must be a maintenance of adequate records for:
a. accounts payable, vouchers payable, checks, general ledger, subsidiary ledgers
b. subsidiary ledgers, accounts payable, purchase orders, checks, general ledger
c. general ledger, subsidiary ledger, checks, purchase orders, cash disbursements
d. checks, cash disbursements, subsidiary ledger, cash disbursements
14. There is an access to inventories (direct), cash (direct) and accounting records (indirect) in Manual Access
Controls.
a. True
b. False
15. The expenditure cycle is the set of activities related to the acquisition of and payment for goods and services.
a. False
b. True
16. Why does computer-based supervision needed?
a. Supervision takes on new aspects as technology advances.
b. The workplace becomes more sophisticated.
C.Automation often leads to a collapsing of the traditional segregation of duties.
D. all of the above
17. Im computer-based expenditure, the computer updates the inventory subsidiary file from the receiving
report, calculates batch totals for the general ledger update procedure and then closes the corresponding
records in the open PO file to the closed PO file.
a. True
b. False
18. What starts the expenditure cycle?
a. When there is a need for an item
b. When the journal voucher is used to update the general ledger.
C. When the accounts payable control account is reconciled with the subsidiary summary.
D. B & C are correct
19. The time lag splits the expenditure transaction cycle into two phases: physical phase (purchasing cycle) and
financial phase (cash disbursements)
a. False
b. True
20. Within the expenditure cycle, supervision is of highest importance in the Receiving department, where the
inventory arrives and is logged in by a receiving clerk. Need to minimize:
a. failures to properly inspect the assets
b. theft of the assets
c. failures to inspect liability
d. a & b are correct
Download