Uploaded by restricted

ACCOUNTING INFORMATION SYSTEM - MIDTERM REVIEWER

advertisement
CHAPTER 1
1. An example of a financial transaction is
a. the purchase of a computer
b. a supplier’s price list
c. a delivery schedule
d. an employee benefit brochure
2. Most of the inputs to the General Ledger System come from the Financial Reporting System
True
False
3. One of the greatest disadvantages of database systems is that all data is always available to all
users
True
False
4. Which of the following is not a business resource
a. raw material
b. labor
c. information
d. all are business resources
5. Transaction processing systems convert non-financial transactions into financial transactions
True
False
6. Information Technology (IT) audits can be performed by both internal and external auditors
True
False
7. Which level of management is responsible for short-term planning and coordination of activities
necessary to accomplish organizational objectives
a. operations management
b. middle management
c. top management
d. line management
8. Which level of management is responsible for controlling day-to-day operations
a. operations management
b. middle management
c. top management
d. line management
9. Increased control is one of the key advantages of distributed data processing
True
False
10. The ability to achieve the goals of a system depends upon the effective functioning and
harmonious interaction between its subsystems. This is called
a. system decomposition
b. system redundancy
c. backup system
d. subsystem interdependency
11. Information is a business resource
True
False
12. The internal auditor represents the interests of third-party outsiders
True
False
13. A balance sheet prepared in conformity with GAAP is an example of discretionary reporting
True
False
14. Independent auditing is performed by
a. external auditors
b. internal accountants
c. licensed auditors
d. third-party accountants
15. The database administrator is responsible for the security and integrity of the database
True
False
16. The Management Reporting System provides the internal financial information needed to
manage a business.
True
False
17. When preparing discretionary reports, organizations can choose what information to report and
how to present it.
True
False
18. Which subsystem is not part of the Accounting Information System?
a. Transaction Processing System
b. Expert System
c. General Ledger/Financial Reporting System
d. Management Reporting System
19. The term “accounting independence” refers to
a. data integrity
b. separation of duties, such as record keeping and custody of physical resources
c. generation of accurate and timely information
d. business segmentation by function
20. The value of information for users is determined by all of the following but
a. reliability
b. relevance
c. convenience
d. completeness
21. Information lacking reliability may still have value
True
False
22. The objectives of all information systems include all of the following except
a. support for the stewardship function of management
b. evaluating transaction data
c. support for the day-to-day operations of the firm
d. support for management decision making
23. In the distributed data processing approach
a. computer services are consolidated and managed as a shared organization resource
b. the computer service function is a cost center
c. the end users are billed using a charge-back system
d. computer services are organized into small information processing units under the
control of end users
24. An example of a nonfinancial transaction is
a. sale of products
b. cash disbursement
c. log of customer calls
d. purchase of inventory
25. An information system is an example of a natural system
True
False
CHAPTER 2 : TRUE OR FALSE
1. Processing more transactions at a lower unit cost makes batch processing more efficient than
real-time systems. True
2. The process of acquiring raw materials is part of the conversion cycle. False
3. Directing work-in-process through its various stages of manufacturing is part of the conversion
cycle. True
4. The top portion of the monthly bill from a credit card company is an example of a turn-around
document. True
5. The general journal is used to record recurring transactions that are similar in nature. False
6. Document flowcharts are used to represent systems at different levels of detail. False
7. Data flow diagrams represent the physical system. False
8. Document flowcharts are often used to depict processes that are handled in batches. True
9. Program flowcharts depict the type of media being used (paper, magnetic tape, or disks) and
terminals. False
10. System flowcharts represent the input sources, programs, and output products of a computer
system. True
11. Program flowcharts are used to describe the logic represented in system flowcharts. True
12. Batch processing systems can store data on direct access storage devices. True
13. Backups are automatically produced in a direct access file environment. False
14. The box symbol represents a temporary file. False
15. Auditors may prepare program flowcharts to verify the correctness of program logic. True
16. A control account is a general ledger account which is supported by a subsidiary ledger. True
17. The most significant characteristic of direct access files is access speed. True
18. Real time processing is used for routine transactions in large numbers. False
19. Batch processing is best used when timely information is needed because this method processes
data efficiently. False
20. An inverted triangle with the letter "N" represents a file in "name" order. False
21. Real-time processing in systems that handle large volumes of transactions each day can create
operational inefficiencies. True
22. Operational inefficiencies occur because accounts unique to many concurrent transactions need
to be updated in real time. False
23. Operational inefficiencies occur because accounts common to many concurrent transactions
need to be updated in real time. True
24. Batch processing of noncritical accounts improves operational efficiency. True
25. Batch processing of accounts common to many concurrent transactions reduces operational
efficiency. False
1. Which system is not part of the expenditure cycle?
a. cash disbursements
b. payroll
c. production planning/control
d. purchases/accounts payable
2. Which system produces information used for inventory valuation, budgeting, cost control,
performance reporting, and make-buy decisions?
a. sales order processing
b. purchases/accounts payable
c. cash disbursements
d. cost accounting
3. Which of the following is a turn-around document?
a. remittance advice
b. sales order
c. purchase order
d. payroll check
4. The order of the entries made in the ledger is by
a. transaction number
b. account number
c. date
d. user
5. The order of the entries made in the general journal is by
a. date
b. account number
c. user
d. customer number
6. In general a special journal would not be used to record
a. sales
b. cash disbursements
c. depreciation
d. purchases
7. Which account is least likely to have a subsidiary ledger?
a. sales
b. accounts receivable
c. fixed assets
d. inventory
8. Subsidiary ledgers are used in manual accounting environments. What file is comparable to a
subsidiary ledger in a computerized environment?
a. archive file
b. reference file
c. transaction file
d. master file
9. A journal is used in manual accounting environments. What file is comparable to a journal in a
computerized environment?
a. archive file
b. reference file
c. transaction file
d. master file
10. In a computerized environment, a list of authorized suppliers would be found in the
a. master file
b. transaction file
c. reference file
d. archive file
11. Which of the following is an archive file?
a. an accounts payable subsidiary ledger
b. a cash receipts file
c. a sales journal
d. a file of accounts receivable that have been written off
12. Which document is not a type of source document?
a. a sales order
b. an employee time card
c. a paycheck
d. a sales return receipt
13. The most important purpose of a turn-around document is to
a. serve as a source document
b. inform a customer of the outstanding amount payable
c. provide an audit trail for the external auditor
d. inform the bank of electronic funds deposits
14. Which type of graphical documentation represents systems at different levels of detail?
a. data flow diagram
b. document flowchart
c. system flowchart
d. program flowchart
15. Data flow diagrams
a. depict logical tasks that are being performed, but not who is performing them
b. illustrate the relationship between processes, and the documents that flow between them and trigger
activities
c. represent relationships between key elements of the computer system
d. describe in detail the logic of the process
16. Document flowcharts
a. depict logical tasks that are being performed, but not who is performing them
b. illustrate the relationship between processes, and the documents that flow between them and trigger
activities
c. represent relationships between key elements of the computer system
d. describe the logic of the process
17. When determining the batch size, which consideration is the least important?
a. achieving economies by grouping together large numbers of transactions
b. complying with legal mandates
c. providing control over the transaction process
d. balancing the trade off between batch size and error detection
18. In contrast to a real-time system, in a batch processing system
a. there is a lag between the time when the economic event occurs and the financial records are
updated
b. relatively more resources are required
c. a greater resource commitment per unit of output is required
d. processing takes place when the economic event occurs
19. In contrast to a batch processing system, in a real-time system
a. a lag occurs between the time of the economic event and when the transaction is recorded
b. relatively fewer hardware, programming, and training resources are required
c. a lesser resource commitment per unit of output is required
d. processing takes place when the economic event occurs
20. The type of transaction most suitable for batch processing is
a. airline reservations
b. credit authorization
c. payroll processing
d. adjustments to perpetual inventory
21. The type of transaction most suitable for real-time processing is
a. recording fixed asset purchases
b. recording interest earned on long-term bonds
c. adjusting prepaid insurance
d. recording a sale on account
22. Which step is not found in batch processing using sequential files?
a. control totals
b. sort runs
c. edit runs
d. immediate feedback of data entry errors
23. Both the revenue and the expenditure cycle can be viewed as having two key parts. These are
a. manual and computerized
b. physical and financial
c. input and output
d. batch and real-time
24. All of the following can provide evidence of an economic event except
a. source document
b. turn-around document
c. master document
d. product document
25. Which method of processing does not use the destructive update approach?
a. batch processing using direct access files
b. real-time processing
c. batch processing using sequential files
d. all of the above use the destructive update approach
26. The characteristics that distinguish between batch and real-time systems include all of the
following except
a. time frame
b. resources used
c. file format
d. efficiency of processing
27. A file that stores data used as a standard when processing transactions is
a. a reference file
b. a master file
c. a transaction file
d. an archive file
28. Sequential storage means
a. data is stored on tape
b. access is achieved through an index
c. access is direct
d. reading record 100 requires first reading records 1 to 99
29. Real-time processing would be most beneficial in handling a firm's
a. fixed asset records
b. retained earning information
c. merchandise inventory
d. depreciation records
30. Which accounting application is least suited for batch processing?
a. general ledger
b. vendor payments
c. sales order processing
d. payroll
31. Which accounting application is best suited for batch processing?
a. general ledger
b. vendor payments
c. sales order processing
d. payroll
32. Operational inefficiencies occur because
a. accounts both common and unique to many concurrent transactions need to be updated in real time.
b. accounts common to many concurrent transactions need to be updated in real time.
c. accounts unique to many concurrent transactions need to be updated in real time.
d. None of the above are true statements
33. Operational efficiencies can be improved by
a. updating accounts both common and unique to many concurrent transactions in real time.
b. updating accounts both common and unique to many concurrent transactions in batch mode.
c. updating accounts unique to many concurrent transactions in real time and updating common
accounts in batch mode.
d. None of the above are true statements
IDENTIFICATION
1. This form is issued by the buyer, and presented to the seller, to indicate the details for products
or services that the seller will provide to the buyer. Information included on this form would be
products, quantities, and agreed-upon prices. purchase order
2. A record keeping tool used to record purchases in a manual accounting system. This "tool
“would consist of recording all of the purchased orders issued to vendors in a chronological
order. purchase journal
3. This document, prepared and maintained by the receiving department, is a sequential listing of
all receipts. receiving log
4. Use letters with meaning. The postal state abbreviations are mnemonic. mnemonic codes
5. The policies and procedures that employees follow in completing the purchase of goods or
materials, capturing vendor data and purchase quantities, and routing the resulting purchasing
documents to the proper departments within the company are called: processes
6. The acquisition of materials and supplies and the related cash disbursements is referred to as:
the procurement process
7. This form is prepared to document the need to make a purchase and requests that the specific
items and quantities be purchased. purchase requisition
8. Represent items in some sequential order. Pre-numbered checks are one. sequential codes
9. Use sequential numbering in specific parts of the total code-all current assets begin with '1,
fixed asset '2, etc. block codes
10. Use block codes and start assets with 1, liabilities with 2, etc. chart of accounts
11. Are similar to numeric codes with increased options. A two-character code. alphabetic codes
CHAPTER 3
Ethics - are needed when conflicts arise—the need to choose
Employees, management, stakeholders - In business, conflicts may arise between:
How do managers decide on what is right in conducting their business? How do they achieve it?
Business ethics involves finding the answers to two questions. What are those?
Computer Ethics - concerns the social impact of computer technology (hardware, software, and
telecommunications).
What are the main computer ethics issues?
Privacy
Security
Ownership of property
Equity in access
Environmental issues
Artificial intelligence
Unemployment and displacement
Misuse of computer
Characteristics of Legal Fraud:
False Representation
Material Fact
Intent to deceive
Justified Reliance
Injury or loss
Fraud - A false statement or disclosure with that fact must be substantial in inducing someone to act and
Intent to deceive must exist.
True - The misrepresentation must have resulted in justifiable reliance upon information, which caused
someone to act. True or False?
True - The misrepresentation must have caused injury or loss. True or False?
Sarbanes-Oxley Act of 2002 - Its principal reforms pertain to Creation of the Public Company Accounting
Oversight Board (PCAOB), auditor independence, corporate governance and responsibility, disclosure
requirements, and New federal crimes for the destruction of or tampering with documents, securities
fraud, and actions against whistle blowers.
Employee Fraud - Committed by non-management personnel and usually consists of an employee
taking cash or other assets for personal gain by circumventing a company's system of internal controls
Management Fraud - Frequently involves using financial statements to create an illusion that an entity is
more healthy and prosperous than it actually
Management Fraud - Involves misappropriation of assets, it frequently is shrouded in a maze of complex
business transactions
Fraudulent Statements, Corruption, Asset Misappropriation - Three categories of fraud schemes
according to the Association of Certified Fraud Examiners
Fraudulent Statements - Misstating the financial statements to make the copy appear better than it is
Fraudulent Statements - May also be related to management bonus packages being tied to financial
statements
Fraudulent Statements - May be tied to focus on short-term financial measures for success
Fraudulent Statements -Usually occurs as management fraud
Corruption - Involves bribery, illegal gratuities, conflicts of interest or economic extortion.
Foreign Corrupt Practice Act of 1977 - Indicative of corruption in business world and impacted
accounting by requiring accurate records and internal controls
Asset Misappropriation - Most common type of fraud and often occurs as employee fraud
Asset Misappropriation - making charges to expense accounts to cover theft of asset (especially cash)
Lapping - using customer's check from one account to cover theft from a different account
Transaction Fraud - deleting, altering, or adding false transactions to steal assets
Internal Control Objectives According to AICPA SAS (SEPM)
Safeguard assets of the firm
Ensure accuracy and reliability of accounting records and information
Promote efficiency of the firm's operations
Measure compliance with management's prescribed policies and procedures
Management Responsibility - The establishment and maintenance of a system of internal control is the
responsibility of management
Reasonable Assurance - The cost of achieving the objectives of internal control should not outweigh its
- benefits
Limitations of Internal Controls (PCMC)
Possibility of honest errors
Circumvention via collusion
Management override
Changing conditions
Exposures of Weak Internal Controls (Risk) [DTCD]
Destruction of an asset
Theft of an asset
Corruption of information
Disruption of the information system
SAS 78 / COSO
Describes the relationship between the firm's internal control structure, auditor's assessment of risk,
and the planning of audit procedures
True - The weaker the internal control structure, the higher the assessed level of risk; the higher the risk,
the more auditor procedures applied in the audit. True or False?
Five Internal Control Components of SAS 78 / COSO
Control environment
Risk assessment
Information and communication
Monitoring
Control activities
Control Environment - Includes Integrity and ethics of management, Organizational structure, Role of
the board of directors and the audit committee, Management's policies and philosophy, Delegation of
responsibility and authority, Performance evaluation measures, External influences—regulatory
agencies and Policies and practices managing human resources.
Risk Assessment - Identify, analyze and manage risks relevant to financial reporting such as changes in
external environment, risky foreign markets, significant and rapid growth that strain internal controls,
new product lines, restructuring, downsizing and changes in accounting policies
Information and Communication - The AIS should produce high quality information which identifies and
records all valid transactions, provides timely information in appropriate detail to permit proper
classification and financial reporting, accurately measures the financial value of transactions and
accurately records transactions in the time period in which they occurred
Monitoring - The process for assessing the quality of internal control design and operation
Control Activities - Policies and procedures to ensure that the appropriate actions are taken in response
to identified risks
Control Activities Fall into two distinct categories
IT controls - relate specifically to the computer environment
Physical controls - primarily pertain to human activities
Two Types of IT Controls
General Controls - pertain to the entity wide computer environment
Application Controls - ensure the integrity of specific systems
General Controls - controls over the data center, organization databases, systems development, and
program maintenance
Application Controls - controls over sales order processing, accounts payable, and payroll applications
Six types of Physical Controls
-
Transaction Authorization
Segregation of Duties
Supervision
Accounting Records
Access Control
Independent Verification
Transaction Authorization - used to ensure that employees are carrying out only authorized
transactions
General Authorizations - Authorization for everyday procedures
Specific Authorizations - Authorization for non-routine transactions
Segregation of Duties in Manual Systems - separation between authorizing and processing a
transaction, custody and record keeping of the asset and sub tasks
Segregation of Duties in Computerized Systems - separation between program coding,program
processing and program maintenance
Supervision - a compensation for lack of segregation; some may be built into computer systems
Accounting Records - These provide an audit trail
Access Controls - help to safeguard assets by restricting physical access to them
Independent Verification - reviewing batch totals or reconciling subsidiary accounts with control
accounts
Transaction Authorization - The rules are often embedded within computer programs
Segregation of Duties - A computer program may perform many tasks that are deemed incompatible
thus the crucial need to separate program development, program operations, and program
maintenance.
Supervision - The ability to assess competent employees becomes more challenging due to the greater
technical knowledge required
Accounting Records - ledger accounts and sometimes source documents are kept magnetically and no
audit trail is readily apparent
Access Control - Data consolidation exposes the organization to computer fraud and excessive losses
from disaster
Independent Verification - When tasks are performed by the computer rather than manually, the need
for an independent check is not necessary. However, the programs themselves are checked.
Download