Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA PassMaster Questions–Business 4 Export Date: 10/30/08 1 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Introduction to Information Technology CPA-03480 Type1 M/C 1. CPA-03480 BEC C03 #4 A-D Corr Ans: A PM#4 B 4-01 Page 10 A report that does not currently exist but that needs to be created on demand without having to get a software developer involved is known as a/an: a. b. c. d. Ad hoc report. Demand report. Exception report. Scheduled report. CPA-03480 Explanation Choice "a" is correct. An ad hoc report is a report that does not currently exist but that needs to be created on demand without having to get a software developer involved. Choice "b" is incorrect. A demand report is a specific report that can be printed or viewed on demand. Choice "c" is incorrect. An exception report is a report produced when a specific condition or "exception" occurs. Choice "d" is incorrect. Scheduled reports are the more traditional reports that display information in a predefined format and that are made available on a regular basis. CPA-03487 Type1 M/C 2. CPA-03487 D96 - 1.27 A-D Corr Ans: D PM#6 B 4-01 Page 7 Which one of the following terms best describes a Decision Support System (DSS)? a. b. c. d. Management reporting system. Formalized system. Structured system. Interactive system. CPA-03487 Explanation Choice "d" is correct. Decision support systems are computer-based information systems that provide interactive support to managers or others during the decision-making process. Choice "a" is incorrect. Management reporting systems provide managers with the information needed for day-to-day decision making. Choice "b" is incorrect. A formalized system is a generic term used to describe any system operating in proper or regular form. Choice "c" is incorrect. A structured system is a system in which each program within a system is independent of other programs within the system. This enables programming teams to work independently on different programs within the same system. CPA-04598 Type1 M/C 3. CPA-04598 BEC C05 #1 A-D Corr Ans: C PM#10 B 4-01 Page 5 Which of the following statements is (are) correct for data? I. Production and test data are normally stored together in the same databases. II. Production and test data are normally stored separately, with the production data stored in production databases and the test data stored in test databases. III. Access to production and test data are normally the same. a. I and III only are correct. b. II and III only are correct. 2 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 c. II only is correct. d. None of the listed statements is correct. CPA-04598 Explanation Choice "c" is correct. Production and test data are normally stored separately, with the production data stored in production databases and the test data stored in test databases. Only personnel with a need to access production data should have access to that data. Access to test data can be considerably more open. CPA-05169 Type1 M/C A-D Corr Ans: C PM#21 B 4-01 4. CPA-05169 Page 9 Avon Corporation has a management information system. From the management information system, several different reports are available, including reports that are monthly budget vs. actual reports, reports that highlight where sales representatives have not met their assigned sales quotas, account analysis reports that can be requested by accountants as needed as a part of the closing process, and reports that are created by end users to obtain information as needed at any time during the month. The 4 types of reports are best described as: a. b. c. d. Demand reports, scheduled reports, exception reports, and ad hoc reports. Scheduled reports, ad hoc reports, exception reports, and demand reports. Scheduled reports, exception reports, demand reports, and ad hoc reports. Exception reports, scheduled reports, demand reports, and ad hoc reports. CPA-05169 Explanation Choice "c" is correct. Monthly reports of budget vs. actual data, or anything else, are normally called scheduled reports that are produced without anybody having to request them. Reports that highlight sales representatives not having met their assigned sales quotas are normally called exception reports. Reports that analyze accounts, or that provide other specific and non-changeable information, but only on demand, are normally called demand reports. Reports that provide information as requested by the end user, and are available on demand, are normally called ad hoc reports. Note that these names are generic names. An individual organization in the real world may call the reports something else again. Choices "a", "b", and "d" are incorrect, per the above descriptions. CPA-05317 Type1 M/C A-D Corr Ans: D PM#22 B 4-01 5. CPA-05317 Released 2006 Page 3 In business information systems, the term "stakeholder" refers to which of the following parties? a. The management team responsible for the security of the documents and data stored on the computers or networks. b. Information technology personnel responsible for creating the documents and data stored on the computers or networks. c. Authorized users who are granted access rights to the documents and data stored on the computers or networks. d. Anyone in the organization who has a role in creating or using the documents and data stored on the computers or networks. CPA-05317 Explanation Note: The material tested in this question does not appear specifically on-point in our textbook, as the topic has rarely shown up on the CPA exam. However, this answer is essentially common sense, and we 3 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 believe that our students would have answered this question correctly given the information they had. Regardless, we have expanded our explanation of this question to provide more detailed information. Choice "d" is correct. In business information systems, the term "stakeholder" could refer to anyone in the organization who has a role in creating or using data stored on the computers or networks. This term is not covered anywhere in the Becker materials, but the question can almost be answered entirely by using common sense. The description in choice "d" is the most inclusive of the descriptions listed. It certainly should include anyone who "uses" the information because users would certainly have some interest in the data being correct and complete. So would the people who created the data in the first place. Management certainly would also. Choice "a" is incorrect. The management team responsible for security certainly would be stakeholders, but so would others. Choice "b" is incorrect. Information technology personnel responsible for creating the data certainly would be stakeholders, but so would others. Choice "c" is incorrect. Authorized users who use the data certainly would be stakeholders, but so would others. CPA-05319 Type1 M/C A-D Corr Ans: C PM#23 B 4-01 6. CPA-05319 Released 2006 Page 6 Which of the following cycles does not have accounting information that is recorded in the general ledger reporting system? a. b. c. d. Expenditure. Production. Planning. Revenue. CPA-05319 Explanation Choice "c" is correct. A planning cycle does not necessarily have information recorded in the general ledger system. The planning cycle does not normally result in real transactions. The general ledger system (the general ledger system is not just a reporting system) records real transactions (or at least real Journal Entries). Choice "a" is incorrect. Expenditures (at least the Journal Entries for those expenditures) are recorded in the general ledger system. Choice "b" is incorrect. Production (at least the expenditures necessary for the production to occur and the Journal Entries for those expenditures) is recorded in the general ledger system. Choice "d" is incorrect. Revenue (at least the Journal Entries resulting from that revenue) is recorded in the general ledger system. CPA-05327 Type1 M/C A-D Corr Ans: D PM#24 B 4-01 7. CPA-05327 Released 2006 Page 3 In which of the following phases of computer system development would training occur? a. b. c. d. Planning phase. Analysis phase. Design phase. Implementation phase. CPA-05327 Explanation Note: The material tested in this question does not appear specifically on-point in our textbook, as the topic has rarely shown up on the CPA exam. However, this answer is essentially common sense, and we believe that our students would have answered this question correctly given the information they had. 4 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "d" is correct. Training should certainly not occur before the implementation phase. Before that, the system is not necessarily finalized. Besides, until something at least is developed, there is nothing to train on. Choice "a" is incorrect. Training should certainly not occur in the planning phase. There is no system yet. Choice "b" is incorrect. Training should certainly not occur in the analysis phase. There is no system yet. Choice "c" is incorrect. Training should certainly not occur in the design phase. There is no system yet. CPA-05587 Type1 M/C A-D Corr Ans: B PM#25 B 4-01 8. CPA-05587 Released 2007 Page 3 What should be examined to determine if an information system is operating according to prescribed procedures? a. b. c. d. System capacity. System control. System complexity. Accessibility to system information. CPA-05587 Explanation Note to Students: The terms referenced in this question do not show up (or rarely show up) in practice and are confusing in that we have to apply assumptions about what they must mean. Therefore, they are not included in our text or in the Technical Addendum for B4. The most likely explanation about why this question was released is that it was not answered correctly by candidates and that it will not be used again. However, we are going to use this question as a learning experience for our students. What do you do when you are faced with a question that does not make a whole bunch of sense? Generally, you try to eliminate answers that could not be correct and do your best to choose among the remaining alternatives. Remember, you need a 75% to PASS… questions like this one rarely show up. Choice "b" is correct. This question is asking if the system is operating according to "prescribed procedures." It is difficult to determine what the words "prescribed procedures" and "system control" even mean. We pretty much have to assume that "prescribed procedures" means that the system is operating "correctly" or is producing the correct results. With that interpretation, the best way that the correct answer can be obtained is by eliminating the other choices as being incorrect. Choice "b" is then the only one left. Choice "a" is incorrect. System capacity is a factor in operating a system (system capacity normally means processor capacity (i.e., how many transactions can the processor or processors process in a certain period of time), but it has nothing directly to do with whether the system is operating correctly. A system can have the capacity to generate a large number of incorrect answers. This choice can be eliminated. Choice "c" is incorrect. System complexity is a factor in operating a system, but it theoretically has nothing to do with whether the system is operating correctly. It is true that the more complex a system, the less chance there is that it will operate correctly. Complexity breeds errors. However, that does not make this choice the correct answer. Choice "d" is incorrect. Accessibility to system information is a factor in operating a system, but it has nothing to do with whether the system is operating correctly. Somewhat like system capacity, a system can be less than optimal in that it does not provide the (desired) access to system information (assumed here to be the application data in the system or information about how the system is operating), but that does not mean that the system is not operating correctly. It just may not be meeting some of its accessibility requirements. CPA-05595 Type1 M/C A-D Corr Ans: C PM#26 B 4-01 9. CPA-05595 Released 2007 Page 7 5 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Which of the following artificial intelligence information systems cannot learn from experience? a. b. c. d. Neural networks. Case-based reasoning systems. Rule-based expert systems. Intelligent agents. CPA-05595 Explanation Choice "c" is correct. Artificial intelligence is discussed in the B4 Technical Addendum; it is not discussed in the main text. Rule-based expert systems are based on rules that are built into the system. The only way that those systems can "learn" is if the rules are updated by some external party. That is not really the "system" that is learning. Choice "a" is incorrect. Neural networks are networks that are based (as much as possible) on the human brain. The human brain can learn from experience, and neural networks can learn (at least theoretically). Choice "b" is incorrect. Case-based reasoning systems are systems that reason based on past problems that are similar. This reasoning is a form of learning. Choice "d" is incorrect. Intelligent agents (in an artificial intelligence sense) are agents that assist users and act on their behalf. The "intelligent" aspect means, or at least implies, that the agent can learn from what is happening or what has happened. Roles and Responsibilities within the IT Function CPA-03505 Type1 M/C 10. CPA-03505 J91 - 6C A-D Corr Ans: C PM#2 B 4-02 Page 14 The duties and responsibilities of the database administrator include: I. Design and control of a firm's database. This responsibility includes ensuring application independence and back-up and recovery procedures. II. Definition and control of the data in the data dictionary. III. Assignment of user codes and maintenance of other security measures. IV. Control of all changes in data structure and in programs that use the database. a. b. c. d. I, II, and III. I, II, and IV. I, III, and IV. I, II, III, and IV. CPA-03505 Explanation Choice "c" is correct. I, III, and IV are correct. Item II is not correct because it refers to the definition and control of the data in the data dictionary. The data is the responsibility of the data administrator. CPA-04599 Type1 M/C 11. CPA-04599 BEC C05 #2 A-D Corr Ans: D PM#3 B 4-02 Page 11 Which of the following statements is (are) correct for purchased application packages? I. If an application package is purchased from an outside vendor and installed, system analysts may be called system integrators. For purchased applications, their main responsibility would be to modify the application to perform the specific functions required from the application. II. If an application package is purchased from an outside vendor and installed, the package must be maintained after installation. Invariably, this maintenance is performed by the vendor. III. If an application package is purchased from an outside vendor and installed, the application must be customized. a. I only is correct. 6 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. I and II only are correct. c. II and III only are correct. d. None of the listed statements is correct. CPA-04599 Explanation Choice "d" is correct. Statement I is an incorrect statement. If an application package is purchased from an outside vendor and installed, system analysts may be called system integrators. For purchased applications, their main responsibility would not be to modify the application to perform the specific functions required from the application but would be to design any interfaces, to convert the initial data for the application, and to provide training to end users. Statement II is an incorrect statement. If an application package is purchased from an outside vendor and installed, the package must be maintained after installation. However, this maintenance may be performed by the vendor or by the organization itself. Of course, the organization would have to have access to the source code to perform any real maintenance on the system itself. Statement III is an incorrect statement. If an application package is purchased from an outside vendor and installed, the application may be customized. Customization will normally hinder the installation of future releases. CPA-04600 Type1 M/C 12. CPA-04600 BEC C05 #3 A-D Corr Ans: D PM#4 B 4-02 Page 12 Which of the following statements is correct for application programs and application programmers? a. If programs are developed internally, a small portion of the overall programming budget will normally be devoted to program maintenance. Program maintenance is quite simple if the programs are written using modern programming techniques. b. Application programmers should be given full write/update access to data in production systems so that data fixes (corrections to production data outside of the normal application programs) can be made quickly with the least amount of paperwork. c. Application programmers should not be allowed to test the programs that they have written because they are not independent. d. None of the listed statements is correct. CPA-04600 Explanation Choice "d" is correct. Choice "a" is incorrect. If programs are developed internally, a large portion of the overall programming budget will normally be devoted to program maintenance. Program maintenance is never simple, regardless of how the programs were written. Modern programming techniques may make program maintenance "simpler," but they will not make it "simple." Choice "b" is incorrect. Application programmers should not be given full write/update access to data in production systems. If a data fix is necessary, temporary write/update access should be provided, and such access should be appropriately documented. Choice "c" is incorrect. Application programmers should be allowed to test the programs that they have written because testing is an integral part of program development. Independence has nothing to do with it. However, some organizations do have testing organizations that test programs after the application programmers have finished their testing. CPA-04601 Type1 M/C 13. CPA-04601 BEC C05 #4 A-D Corr Ans: C PM#5 B 4-02 Page 15 Which of the following statements is not correct for segregation of duties in an IT environment? a. The IT department is a support group in that it normally does not initiate or authorize transactions. 7 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. Segregation of duties in an IT environment normally revolves around granting and/or restricting access to production data and/or production programs. c. The duties of system analysts and application programmers should never be combined. d. Segregation of duties in an IT environment is defined as dividing responsibilities for different portions of a transaction among several different people. CPA-04601 Explanation Choice "c" is correct as it is the only incorrect statement. The duties of system analysts and application programmers can be, and often are, combined. The duties of system programmers and application programmers should not be combined. Choice "a" is incorrect because the statement is true. The IT department is a support group that normally does not initiate or authorize transactions. Choice "b" is incorrect because the statement is true. Segregation of duties normally revolves around granting and/or restricting access to production programs and/or production data. Choice "d" is incorrect because the statement is true. Segregation of duties in an IT environment is defined as dividing responsibilities for different portions of a transaction among several different people. CPA-04829 Type1 M/C A-D Corr Ans: C PM#6 B 4-02 14. CPA-04829 Released 2005 Page 13 Which of the following areas of responsibility are normally assigned to a systems programmer in a computer system environment? a. b. c. d. Systems analysis and applications programming. Data communications hardware and software. Operating systems and compilers. Computer operations. CPA-04829 Explanation Choice "c" is correct. This is exactly what systems programmers do; they work with operating systems and compilers, etc. Choice "a" is incorrect. System programmers seldom, if ever, write applications programs. The skill sets and mindsets of systems programmers and applications programmers are almost completely different, not to mention that systems programmers doing both would violate good internal control principles. Choice "b" is incorrect because it is not the best answer. Systems programmers could be assigned the responsibility for data communications hardware and software. The data communications software could be part of the operating system, or an adjunct to the operating system. However, the question says "normally." Choice "d" is incorrect. Systems programmers are not normally responsible for computer operations personnel. CPA-05171 Type1 M/C A-D Corr Ans: C PM#7 B 4-02 15. CPA-05171 Page 11 Stratford Corporation uses a general ledger system that was developed internally in the mid-1970s. It is having more and more problems finding people who can support this system because the system was written in PL/1, a general-purpose language developed by IBM in the 1960s that was a mix of COBOL and FORTRAN and that was not widely used in commercial systems. In addition, the person who designed and wrote the system died of a heart attack in December of 1988. Which of the following statements is correct for Stratford to consider in determining whether/how to replace this system? a. If Stratford purchases a new general ledger system from an outside vendor, Stratford must rely on the vendor to maintain and support that system. 8 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. If Stratford purchases a new general ledger system from an outside vendor, Stratford must customize that system to meet its own specific general ledger requirements. c. If Stratford designs and writes a new general ledger system instead of purchasing a new system from an outside vendor, Stratford will be able to design the system to meet its own specific general ledger requirements. d. If Stratford designs and writes a new general ledger system instead of purchasing a new system from an outside vendor, it should purchase life insurance for the major system developers so that it will be protected from future heart attacks. CPA-05171 Explanation Choice "c" is correct. If Stratford designs and writes a new general ledger system instead of purchasing a new system from an outside vendor, Stratford will be able to design the system to meet its own specific general ledger requirements, whatever those requirements might be. However, whether Stratford should design the system to meet those requirements is an entirely different question. Choice "b" is incorrect. If Stratford purchases a new general ledger system from an outside vendor, Stratford may customize that system to meet its own specific general ledger requirements. However, there is a definite cost associated with such customization. Every time a new version of the purchased system is released, the customization will have to be done all over again. Such repeated work will become expensive over time and will almost certainly delay the installation of new versions. Stratford should really examine its "requirements" for a general ledger system and determine how many of those so-called requirements are actually required. After all, the system is a general ledger system. How many specific company requirements can there possibly be for a general ledger system? If there are some "real" specific requirements, these requirements should be considered when the various candidate systems are being investigated in the selection process. The intent, obviously, would be to select the system that comes closest to meeting those requirements. If there are some specific reporting requirements, for example, a reporting mechanism might be able to be added to the system without customizing the core system. So if everything else was equal, the system that should be selected is the system that best accommodates the addition of the reporting mechanism with the least change, and possibly no change, to the core system. Choice "a" is incorrect. If Stratford purchases a new general ledger system from an outside vendor, Stratford may rely on the vendor to maintain and support that system. Note that maintenance and support are two different things. Maintenance is keeping the system "up to date" with new releases from time to time. Assuming that maintenance has been purchased from the vendor, the vendor normally maintains the system. Stratford may or may not even have access to the source code for the programs and thus may or may not be able to maintain it. Support is keeping the system up and running; support includes monitoring the system, determining that a problem has occurred, and fixing or getting around the problem. Support may be provided by the vendor or may be provided by the customer, especially when the system is running in the customer's environment. Choice "d" is incorrect. Even if Stratford purchased life insurance for the major system developers, it might be somewhat financially protected from future heart attacks of those developers, but it will not be protected from anything else. The people who design and write systems are often lost, but the cause is more often resigning or being transferred to other projects. CPA-05172 Type1 M/C A-D Corr Ans: A PM#8 B 4-02 16. CPA-05172 Page 12 Jose Para is an application programmer employed by the law firm of Am, Bulance, & Chasr. AB&C is a relatively small firm with a small number of application programmers for its mainframe computer system, so Jose also acts as the system programmer for that system. Which of the following statements is correct for AB&C? a. Since Jose is the system programmer, Jose can more than likely override any system security and provide himself with unlimited access to application programs and data. 9 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. Since Jose already has write access to application programs in his function as application programmer, his function as system programmer will more than likely provide him no additional access. c. AB&C's accounting system logs all transactions that are entered. This feature is a compensating strength for the weakness that Jose is both an application programmer and a system programmer and will provide sufficient security. d. AB&C's accounting system logs all access attempts to application programs. This feature is a compensating strength for the weakness that Jose is both an application programmer and a system programmer and will provide sufficient security. CPA-05172 Explanation Choice "a" is correct. Since Jose is the system programmer, he can more than likely override any system security and provide himself with unlimited access to application programs and data if he wanted to and if he wanted to do the work to do so. He can more than likely hide any such access. And since he is an application programmer, he might know what to do to the programs and data (for nefarious purposes) when he has such access. One employee acting as both a system programmer and an application programmer is a serious internal control weakness that is very difficult to overcome. Choice "b" is incorrect. Jose has write (update) access to application programs in his function as application programmer. However, his function as system programmer will more than likely allow him to hide such access if he were to choose to do so. One employee acting as both a system programmer and an application programmer is a serious internal control weakness that is very difficult to overcome. Choice "c" is incorrect. AB&C's accounting system may log all transactions that are entered. However, Jose's access as a system programmer may allow him to bypass this transaction logging and change data in other ways (for example, by "data fixes"). This feature, while potentially a good idea, is not a compensating strength for the weakness that Jose is both an application programmer and a system programmer (although it may be a compensating strength for other weaknesses) and will probably not provide sufficient security. In addition, it is a fact of life that transaction logs are seldom actively monitored. Choice "d" is incorrect. AB&C's accounting system may log all access attempts to application programs. However, Jose's access as a system programmer may allow him to bypass this access logging and change programs in other ways. This feature, while a good idea and a feature of all automated program security systems, is not a compensating strength for the weakness that Jose is both an application programmer and a system programmer (although it may be a compensating strength for other weaknesses) and will probably not provide sufficient security. CPA-05173 Type1 M/C A-D Corr Ans: B PM#9 B 4-02 17. CPA-05173 Page 14 Network Solutions, Inc. (NSI) provides network services to large corporations in the banking industry. To perform these services, it relies on personnel performing various job functions. Which of the following statements is/are correct for Network Solutions, Inc.? I. NSI's database administrator maintains and supports its database system(s). II. NSI's network administrator supports its own internal network(s) by monitoring performance of those networks and troubleshooting any problems. III. NSI's database administrator and network administrator can be the same person. a. b. c. d. III only is correct. I, II, and III are correct. I and II only are correct. II and III only are correct. CPA-05173 Explanation Choice "b" is correct. Statement I is correct. NSI's database administrator maintains and supports its database system(s). Statement II is correct. NSI's network administrator supports its own internal network(s) by monitoring performance of those networks and troubleshooting any problems. Statement 10 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 III is correct. NSI's database administrator and network administrator can be the same person, although that is not likely. Since the skillsets of database administrator and network administrator are both highly technical and very specialized, it is unlikely that one person will perform the two functions, other than possibly in a very small organization with some very talented people. Choice "a" is incorrect. Other statements are also correct. Choice "c" is incorrect. Another statement is also correct. Choice "d" is incorrect. Another statement is also correct. CPA-05174 Type1 M/C A-D Corr Ans: D PM#10 B 4-02 18. CPA-05174 Page 15 Which of the following statements is/are correct with respect to segregation of duties in an IT environment? a. The IT department is a support group and normally does not initiate or authorize transactions. b. In general, segregation of duties is defined as dividing responsibilities for different portions of a transaction (authorization, recording, and custody) among several different people or departments. c. Segregation of duties in an IT environment normally revolves around granting and/or restricting access to production programs and to production data. d. All of the statements are correct. CPA-05174 Explanation Choice "d" is correct. All of the statements are correct. The IT department is a support group and normally does not initiate or authorize transactions. When it does initiate or authorize transactions, those transactions normally are for such activities as leasing hardware, paying software license fees, and other IT-related activities. In general, segregation of duties is defined as dividing responsibilities for different portions of a transaction (authorization, recording, and custody) among several different people or departments. This definition is true in an IT environment or with systems, but it is sometimes harder to accomplish in an IT environment since software may perform many of the functions. Segregation of duties in an IT environment normally revolves around granting and/or restricting access to production programs and to production data. Choices "a", "b", and "c" are incorrect, per the above explanation. IT Fundamentals CPA-03512 Type1 M/C 19. CPA-03512 BEC C03 #6 A-D Corr Ans: A PM#1 B 4-03 Page 19 All of the following are components of a local area network (LAN), except: a. Database Management System (DBMS). b. Network Operating System (NOS). c. Network Interface Card (NIC). d. Node. CPA-03512 Explanation Choice "a" is correct. A DBMS is not a component of a LAN although it can be run on a LAN. Rather it is a separate set of computer programs that allows an organization to create new databases, use and work with the data in a database after the database has been created, and also allows for maintenance to be performed on a database after it has been placed into operation. 11 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "b" is incorrect. A network operating system is a component of a LAN. It is the operating system of a server that manages communication over a network. Choice "c" is incorrect. A network interface card is a component of a LAN. It is the circuit board that the transmission media is plugged into. Choice "d" is incorrect. A node is any device connected to a LAN. CPA-03518 Type1 M/C 20. CPA-03518 BEC C03 #7 A-D Corr Ans: D PM#2 B 4-03 Page 31 Which of the following statements concerning intranets is incorrect? a. An intranet connects geographically separate LANs within an organization. b. A firewall is needed to ensure that unauthorized Internet users cannot access an organization's intranet. c. In order to gain access to an intranet, a user generally must enter a password. d. An intranet web browser is different from an Internet web browser. CPA-03518 Explanation Choice "d" is correct. The same web browser can be used for both intranets and the Internet making choice "d" an incorrect statement. Choice "a" is incorrect because this statement is correct. Choice "b" is incorrect because this statement is correct. Choice "c" is incorrect because this statement is correct. CPA-03527 Type1 M/C 21. CPA-03527 BEC C03 #9 A-D Corr Ans: D PM#4 B 4-03 Page 30 All of the following are characteristics of value added networks (VANs), except: a. b. c. d. Automatic error detection, protocol conversion, and message storing and forwarding services. Very high security because they are private networks. Messages separated by vendor, batched together, and transmitted to their specific destinations. Individual transactions transmitted immediately and which usually reach their destination within minutes. CPA-03527 Explanation Choice "d" is correct. VANs normally batch transactions and transmit them at the end of the day or overnight. Choice "a" is incorrect. These services are characteristics of VANs. Choice "b" is incorrect. Very high security is a characteristic of VANs. Choice "c" is incorrect. Batching of transactions is a characteristic of VANs. CPA-03535 Type1 M/C 22. CPA-03535 BEC C03 #13 A-D Corr Ans: D PM#7 B 4-03 Page 31 An intranet is used to: a. b. c. d. Permit specified external parties to access an organization's network. Surf the World Wide Web. Share an organization's private information with the general public. Connect geographically separate LANs within an organization. 12 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-03535 Explanation Choice "d" is correct. Intranets are private networks that people outside of an organization generally have no access to. Intranets share organizational information by connecting geographically separate LANs within an organization. Choice "a" is incorrect. An extranet, not an intranet, permits specified external parties to access an organization's network. Choice "b" is incorrect. Web browsers such as Internet Explorer or Netscape Navigator are used to surf the World Wide Web. Choice "c" is incorrect. If an organization wanted to share private information with the general public, it would post the information on its website over the Internet, not an intranet. CPA-03539 Type1 M/C 23. CPA-03539 BEC C03 #18 A-D Corr Ans: A PM#9 B 4-03 Page 33 Misstatements in a batch computer system caused by incorrect programs or data may not be detected immediately because: a. b. c. d. Errors in some transactions in a batch may cause rejection of other transactions in the batch. The identification of errors in input data typically is not part of the system. There are no time delays in processing transactions in a batch system. The processing of transactions in a batch system is not uniform. CPA-03539 Explanation Choice "a" is correct. Rejection of some transactions in a batch may cause other transactions in the batch to be rejected. These errors may not be detected immediately because of the time delay in processing transactions. Choice "b" is incorrect. Input tests are typically performed for batch as well as for online computer systems. Choice "c" is incorrect. Due to the time delay in processing batches of transactions, errors in processing transactions may not be detected immediately. Choice "d" is incorrect. Processing of transactions in a batch system is uniform. CPA-03540 Type1 M/C 24. CPA-03540 4D.C02 - 3 A-D Corr Ans: C PM#10 B 4-03 Page 23 Analysis of large and diverse amounts of data included in data warehouses is often referred to as: a. b. c. d. Systems analysis. Electronic Data Interchange (EDI). Data mining. Data processing. CPA-03540 Explanation Choice "c" is correct. Data mining refers to the process of sifting through large amounts of data, impossible to analyze by individuals, to search for relationships amongst various data as a means for achieving strategic or competitive advantage. Choice "a" is incorrect. Systems analysis is the analytical evaluation of the manner in which systems process data. Choice "b" is incorrect. Electronic Data Interchange (EDI) is the transfer of data between various systems in machine-readable formats. Choice "d" is incorrect. Data processing is a generic term that describes the methods and systems use to collect and process data and produce outputs. 13 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-03545 Type1 M/C 25. CPA-03545 4D.C02 - 12 A-D Corr Ans: C PM#11 B 4-03 Page 31 One of the most popular tools available to business is the Internet. The Internet can best be described as: a. A single server maintained by Interpol to facilitate and monitor all international electronic communications. b. A central computer maintained by the United States government to expedite electronic communications and research. c. A tremendous number of servers dedicated to sending and receiving information to and from other networks. d. A group of servers provided licenses to offer Internet service by the United States government. CPA-03545 Explanation Choice "c" is correct. The Internet is a tremendous number of servers dedicated to sending and receiving information to and from other networks. It is comprised of hundreds of thousands of business, government, military and education networks around the world that all communicate with each other. Choice "a" is incorrect. The Internet is not a single server maintained by any one organization; it is an international network of computers that are linked together. Choice "b" is incorrect. The Internet is not a single computer maintained by any one organization; it is an international network of computers that are linked together. Choice "d" is incorrect. Internet participation is not licensed or restricted by the United States government; it is an international network of computers that are linked together. CPA-03564 Type1 M/C 26. CPA-03564 4D.C02 - 13 A-D Corr Ans: A PM#12 B 4-03 Page 31 Intranets are distinguished from the Internet by what feature? a. Internets allow general access while intranets allow only private access specified by the intranet sponsor. b. Intranets do not allow access to the Internet. c. Intranets provide read only information that is not downloadable. d. Only Internet users can "surf" for information. CPA-03564 Explanation Choice "a" is correct. The Internet is a public information highway while an intranet is a privately sponsored form of electronic communication normally used for organizational communications. Choice "b" is incorrect. Intranets frequently allow for access to the Internet. Security measures are often provided to ensure that Internet users cannot access the sponsoring organization's intranet. Choice "c" is incorrect. Intranets can provide information that can be downloaded or otherwise be handled as interactively as the data retrieved from the Internet. Choice "d" is incorrect. Intranets have many of the same surfing and data collection features common to the Internet. CPA-03566 Type1 M/C 27. CPA-03566 4D.C02 - 15 A-D Corr Ans: C PM#13 B 4-03 Page 31 Corporate intranets are frequently used for all but the following: a. Dissemination of corporate policies. b. Employee directed benefits maintenance. 14 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 c. Providing a portal from the Internet into the sponsoring organization's website. d. Employee training programs. CPA-03566 Explanation Choice "c" is correct. Intranets are not used to provide a portal for external users to access data from the sponsoring organization or to access the sponsoring organization's website. In fact sponsoring organizations take specific measures to provide security that will prevent Internet access to an organization's intranet. Choice "a" is incorrect. Dissemination of corporate policies in read only format is a common use of an intranet. Employees access the home page and click on policies and are able to locate corporate directives from a menu of categories. Choice "b" is incorrect. An advanced use of intranets is employee directed benefits maintenance. Employees of an organization access an internal benefits website, enter a password, and then are able to update health benefit data, deferred compensation deductions or even tax filing status or tax exemption status without any specific interaction with human resources professionals. Choice "d" is incorrect. Staff development functions are a growing use of intranets. Employees of the organization access an employee-training menu from the intranet home page, complete training, and, ultimately, test themselves and submit test scores to satisfy competency requirements. CPA-03567 Type1 M/C 28. CPA-03567 4D.C02 - 21 A-D Corr Ans: B PM#14 B 4-03 Page 31 Which of the following statements concerning the Internet is correct? a. Sending international e-mail is slightly more expensive than sending domestic e-mail. b. If a person has Internet access through an Internet Service Provider (ISP), audio and video signals can be transmitted over the Internet for no additional cost if that person has the appropriate hardware and software. c. A web browser is an optional program someone may use when surfing the web. d. E-mail is generally sent from the sender's computer directly to the recipient's computer. CPA-03567 Explanation Choice "b" is correct. Internet users in different countries can instantly send audio and video if both parties have the proper hardware and software. The remarkable feature is that there is no additional cost when communicating around the world using the Internet. Choice "a" is incorrect. Sending international e-mail is the same cost as sending domestic e-mail. Choice "c" is incorrect. A web browser is a required program for someone who is surfing the web. Choice "d" is incorrect. E-mail is generally sent from the sender's computer through a series of e-mail servers before it reaches the recipient's computer. CPA-03571 Type1 M/C 29. CPA-03571 Au R98 #7 A-D Corr Ans: C PM#16 B 4-03 Page 27 Which of the following is considered a component of a local area network? a. b. c. d. Program flowchart. Loop verification. Transmission media. Input routine. CPA-03571 Explanation Choice "c" is correct. A transmission media is one component of a LAN. Other components are nodes, workstations, servers, network interface cards, operating systems, and communication devices. 15 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "a" is incorrect. A program flowchart is a diagrammatic representation of the sequence of processing steps and the logic included in a computer program. Choice "b" is incorrect. Loop verification is the process of confirming the correctness of the entered data by displaying additional information after data has been entered. Choice "d" is incorrect. An input routine is a series of steps in a program to ensure the accuracy of entered data. It might include steps such as limit tests, field checks, validity tests, etc. CPA-03575 Type1 M/C 30. CPA-03575 J95 - 1.19 A-D Corr Ans: A PM#17 B 4-03 Page 27 A local area network (LAN) is best described as a(n): a. Computer network that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. b. System to allow computer users to meet and share ideas and information. c. Electronic library containing millions of items of data that can be reviewed, retrieved, and analyzed. d. Method to offer specialized software, hardware, and data handling techniques that improve effectiveness and reduce costs. CPA-03575 Explanation Choice "a" is correct. A local area network (LAN) is a computer network that connects computers of all sizes, workstations, terminals, and other devices within a limited proximity. Choices "b" and "c" are incorrect. The Internet allows computer users to meet and share ideas and information as well as allowing access to electronic libraries. Choice "d" is incorrect. LANs typically use standard hardware and software and allow shared access. CPA-03589 Type1 M/C A-D Corr Ans: B PM#20 B 4-03 31. CPA-03589 Au May 94 #16 Page 37 Which of the following statements most likely represents a disadvantage for an entity that keeps microcomputer-prepared data files rather than manually prepared files? a. Attention is focused on the accuracy of the programming process rather than errors in individual transactions. b. It is usually easier for unauthorized persons to access and alter the files. c. Random error associated with processing similar transactions in different ways is usually greater. d. It is usually more difficult to compare recorded accountability with physical count of assets. CPA-03589 Explanation Choice "b" is correct. It is easier to access and alter microcomputer data files than manually prepared data files. Microcomputer access security is difficult to maintain because of the increased number of data entry points and the potential ability to defeat access controls. Choice "a" is incorrect. Once the programs are written, the focus should be on the accuracy of the transactions. Choice "c" is incorrect. One of the benefits of an automated system over a manual system is the removal of random errors from the process. Instead, systematic errors are more common. Choice "d" is incorrect. There is no significant difference between comparing physical counts with accounting records kept on either a manual or an automated system. CPA-03591 Type1 M/C 32. CPA-03591 D94 - 1.14 A-D Corr Ans: B PM#21 B 4-03 Page 36 16 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 A network of computers located throughout an organization's different facilities spread over a wide area to fulfill information processing needs is called: a. b. c. d. A local area network. Distributed data processing system. Interactive processing. Time-sharing. CPA-03591 Explanation Choice "b" is correct. A distributed data processing system is a network of computers located throughout an organization's different facilities normally spread over a wide area to fulfill information processing needs. Choice "a" is incorrect. A local area network is a "local" distributed system allowing resource sharing by users in a relatively small area (e.g., single office). Choice "c" is incorrect. Interactive processing is a method of processing information immediately after input. Choice "d" is incorrect. Time-sharing is a type of multiprocessing system in which many users "share" a central computer owned by an outside vendor and accessed through remote terminals. CPA-03592 Type1 M/C 33. CPA-03592 J91 - 1.26 A-D Corr Ans: D PM#22 B 4-03 Page 34 The concept of timeliness of data availability is most relevant to: a. b. c. d. Payroll systems. General ledger. Computerized systems. On-line systems. CPA-03592 Explanation Choice "d" is correct. On-line systems require immediate response to the user since the user and the computer are "having a conversation." Choice "a" is incorrect. Payroll is a classical example of a batch system. Hours are input and processed, errors are corrected, and checks are then printed. Choice "b" is incorrect. General ledger systems do not require immediate "processing" of input. In fact, they work better when you can "batch" journal entries and have them process at one time. Choice "c" is incorrect. Computer systems can include batch processing as well as on-line processing concepts. CPA-03593 Type1 M/C 34. CPA-03593 J91 - 6A A-D Corr Ans: C PM#23 B 4-03 Page 19 The basic differences between a file-oriented system and a database management system (DBMS) include the following. I. The file-oriented system focuses on individual applications, each with its own set of files and with each file physically separate from the other files. II. In the database management system, the focus is on data rather than a particular application. This leads to data independence, data standardization, one-time data entry, data security, and shared data ownership. a. b. c. d. Only I. Only II. Both I and II. Neither I nor II. 17 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-03593 Explanation Choice "c" is correct. Both I and II are correct. CPA-03596 Type1 M/C 35. CPA-03596 J91 - 6B A-D Corr Ans: C PM#24 B 4-03 Page 19 Advantages of a database management system (DBMS) include: I. Reduced data redundancy and inconsistencies. II. Inability to expand data fields without affecting application programs. III. Data accessibility increases the timeliness, effectiveness, and availability of information. a. b. c. d. I and II. II and III. I and III. I, II, and III. CPA-03596 Explanation Choice "c" is correct. Both I and III are correct. Not II, because an advantage of a DBMS includes the ability to expand data fields without affecting application programs; instead, alterations are needed only in the DBMS. CPA-03600 Type1 M/C 36. CPA-03600 J91 - 6B1 A-D Corr Ans: B PM#25 B 4-03 Page 24 Disadvantages of a database management system (DBMS) include: I. Less highly trained technical personnel are required. II. Increased vulnerability as a common database is highly integrated. A breakdown in hardware or software has a much more severe effect than in a system having separate files and applications. III. Audit trails being somewhat obscured as the result of movement of data from one file to another. a. b. c. d. I and II. II and III. I and III. I, II, and III. CPA-03600 Explanation Choice "b" is correct. Both II and III are correct. Not I, because disadvantages of a DBMS include more - not less - highly trained technical personnel. CPA-03604 Type1 M/C 37. CPA-03604 D90 - 1.24 A-D Corr Ans: D PM#26 B 4-03 Page 36 Information processing made possible by a network of computers dispersed throughout an organization is called: a. b. c. d. Online processing. Interactive processing. Time sharing. Distributed data processing. CPA-03604 Explanation Choice "d" is correct. This is definition of distributed processing, a network of computers dispersed throughout an organization. 18 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choices "a" and "b" are incorrect. An online (interactive) process is a method of processing information where data is processed immediately after input. It can be done on almost any hardware configuration. Choice "c" is incorrect. Time sharing is a method of processing where many users are sharing the same computer. Each user is given a "timeslice" at which time the CPU is executing their program. This is a type of multiprocessing system. CPA-03607 Type1 M/C 38. CPA-03607 D89 - 1.07 A-D Corr Ans: B PM#27 B 4-03 Page 19 Database systems and the resulting concept of database management systems have several unique characteristics not found in traditional systems, specifically file-oriented systems. Which one of the following statements does not apply to database-oriented systems? a. Database systems contain a data definition language that helps describe each schema and subschema. b. The database administrator is the part of the software package that instructs the operating aspects of the program when data are retrieved. c. A primary goal of database systems is to minimize data redundancy. d. Database systems increase user interface with the system through increased accessibility and flexibility. CPA-03607 Explanation Choice "b" is correct. The database administrator is a human who is responsible for the design, maintenance and security of the database. Choice "a" is incorrect. Data definition language (DDL) is one of the tools that is commonly found in a DBMS. These tools help the database administrator design and maintain the data elements themselves as well as define relationships among data elements. Choice "c" is incorrect. Minimizing data redundancy is a primary goal of a DBMS. Choice "d" is incorrect. Increased user interface with the system through increased accessibility and flexibility is a common benefit of using a DBMS. CPA-03619 Type1 M/C 39. CPA-03619 J89 - 1.11 A-D Corr Ans: C PM#28 B 4-03 Page 18 All of the following are examples of computer software, except a(n): a. b. c. d. Operating system. Language translator. Modem. Database management system. CPA-03619 Explanation Choice "c" is correct. A modem is an electronic device that allows signals to be sent over phone lines. Choice "a" is incorrect. An operating system is an integrated group of programs (software) that supervises the operations of a computer system. Choice "b" is incorrect. A language processor known as a compiler, not a language translator, is software that translates source code (human readable) to object code (machine readable). Choice "d" is incorrect. A database management system is software that is in charge of providing data from a database to an application program and writing it back to disk. CPA-04602 Type1 M/C 40. CPA-04602 BEC C05 #5 A-D Corr Ans: B PM#29 B 4-03 Page 17 19 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Which of the following statements is (are) correct for computer hardware? I. Virtual memory is memory where portions of a program that are not being executed are stored, but it is not real memory. II. Virtual memory is that portion of real memory where portions of a program that are not being executed are stored. III. RAID is disk storage where multiple inexpensive disk drives are combined into an array. a. b. c. d. I and II only are correct. I and III only are correct. III only is correct. II and III only are correct. CPA-04602 Explanation Choice "b" is correct. Statement I is a correct statement. Virtual memory is memory where portions of a program that are not being executed are stored, but it is not real memory. It is actually a part of disk storage. When the part of the program that is being stored in virtual memory is to be executed, the part of the program is retrieved and stored in real memory. Statement III is a correct statement. RAID is disk storage where multiple inexpensive disk drives are combined into an array of disk drives to obtain performance, capacity, and reliability that exceed that of a single large disk drive. Statement II is an incorrect statement. Virtual memory is NOT real memory. CPA-04603 Type1 M/C 41. CPA-04603 BEC C05 #6 A-D Corr Ans: A PM#30 B 4-03 Page 18 All of the following statements are correct for processors and processing power, except: a. Processing power is often measured in terms of MIPS, which is millions of instructions per minute. b. In addition to processing power, there are many other factors, such as the speed of the input and output devices, that determine the overall processing power of a computer system. c. When multiple processors or computers process the same program, there is an efficiency loss to provide the control of the overall processing. This factor is called the multiprocessing (MP) factor. d. Multiprocessing is the coordinated processing of programs by more than one processor. CPA-04603 Explanation Choice "a" is correct. It is an incorrect statement. Processing power is often measured in terms of MIPS, which is millions of instructions per second, not per minute. Choices "b", "c", and "d" are incorrect because these three statements are correct. CPA-04604 Type1 M/C 42. CPA-04604 BEC C05 #7 A-D Corr Ans: D PM#31 B 4-03 Page 26 Which of the following statements is (are) correct for application software? I. Application software can be purchased or developed internally. If application software is purchased, the purchase is of the software itself, and the purchaser can do whatever it wishes with the software. II. When application software is purchased, the purchaser invariably receives a copy of the source code and, for large applications, the source code is escrowed. Escrow of the source code protects the software vendor if the purchaser fails to live up to its contractual obligations. III. When application software is purchased, maintenance for that software may or may not be purchased. Maintenance is normally updates and support. 20 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 a. b. c. d. I, II, and III are correct. I and II only are correct. II and III only are correct. III only is correct. CPA-04604 Explanation Choice "d" is correct. Statement I is an incorrect statement. Application software can be purchased or developed internally. If application software is purchased, what is being purchased is a license to use the software under certain prescribed terms and conditions. Statement II is an incorrect statement. When application software is purchased, the purchaser may or may not receive a copy of the source code. The source code may or may not be escrowed. Escrow of the source code supposedly protects the purchaser if the software vendor fails to live up to its contractual obligations. CPA-04605 Type1 M/C 43. CPA-04605 BEC C05 #8 A-D Corr Ans: C PM#32 B 4-03 Page 27 All of the following statements are correct for a telecommunications network, except: a. Some of the functions of a telecommunications network are to establish an interface between the sender and the receiver of the message and to transmit the message. b. A communication or network protocol is the set of rules that allows the various pieces of hardware and software that are included in the network to communicate. c. Routers connect different types of networks, and gateways route packets of data through interconnected LANs. d. A bridge is used to connect segments of a LAN which both use the same set of network protocols. CPA-04605 Explanation Choice "c" is correct. It is an incorrect statement. Gateways connect different types of networks, and routers route packets of data through interconnected LANs. Choices "a", "b", and "d" are incorrect because these three statements are correct. CPA-04606 Type1 M/C 44. CPA-04606 BEC C05 #9 A-D Corr Ans: B PM#33 B 4-03 Page 32 Which of the following statements is (are) correct for transaction processing modes? I. In batch processing, the grandfather-father-son file rotation procedure can be used either to recover from processing problems or to retain files off-site for disaster recovery. II. Batch totals, often used in batch processing, are totals of dollar fields in transactions. The total computed from the batch is compared to an input batch total for the batch of transactions; if the two totals are the same, processing of the batch can continue. III. Hash totals, often used in batch processing, are totals of fields in transactions other than dollars. The total computed from the batch is compared to an input hash total for the batch of transactions; if the two totals are the same, processing of the batch can continue. IV. In the past, batch processing predominated. These days, there is no justification for batch processing. a. b. c. d. I and III only are correct. I, II, and III are correct. I and IV only are correct. II and III only are correct. 21 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-04606 Explanation Choice "b" is correct. All of the statements other than IV are correct. In the past, batch processing predominated. These days, a much larger portion of system processing is on-line rather than batch, but batch processing is still often used for system to system transfers of data, updating separate data warehouses, and the like. CPA-04607 Type1 M/C 45. CPA-04607 BEC C05 #10 A-D Corr Ans: C PM#34 B 4-03 Page 32 All of the following statements are correct for programmed controls, except: a. Programmed controls can be divided into input controls, processing controls, and output controls. b. Input controls are utilized in batch systems where a report of rejected transactions is produced. The rejected transactions are corrected and re-submitted. c. Input controls are not really necessary in on-line systems since the person entering the transactions can review them as they are being entered and ensure that they are correct. d. Output controls relate to the accuracy and distribution of reports. CPA-04607 Explanation Choice "c" is correct. It is an incorrect statement. Input controls are necessary in on-line systems because the person entering the transactions may not or may not be able to review the transactions as they are being entered. The person entering the transactions may not be aware of the nature of the transactions and/or may not have the information or the time to review the transactions. For example, one input control is to check for the validity of an account number. The person entering the transactions would not have any idea whether a reasonable looking account number was valid or not. Choices "a", "b", and "d" are incorrect because these three statements are correct. CPA-04822 Type1 M/C A-D Corr Ans: A PM#35 B 4-03 46. CPA-04822 Released 2005 Page 20 In an accounting information system, which of the following types of computer files most likely would be a master file? a. b. c. d. Inventory subsidiary. Cash disbursements. Cash receipts. Payroll transactions. CPA-04822 Explanation Choice "a" is correct. The question can be readily addressed by using the "odd man out" principle. Just look at the other three choices. Each of them is a transaction file of some type; one of them is even called a transaction file. The other two (cash disbursements and cash receipts) are both transactions in a non-computerized accounting system and are transaction files in a computerized accounting system. Choices "b", "c", and "d" are incorrect, per the above explanation. CPA-04834 Type1 M/C A-D Corr Ans: A PM#36 B 4-03 47. CPA-04834 Released 2005 Page 29 Most client/server applications operate on a three-tiered architecture consisting of which of the following layers? a. Desktop client, application, and database. b. Desktop client, software, and hardware. 22 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 c. Desktop server, application, and database. d. Desktop server, software, and hardware. CPA-04834 Explanation Choice "a" is correct. A three-tier architecture is desktop client, application, and database. Choice "b" is incorrect. Client/server architecture does not include hardware in the architecture. That eliminates both choices "b" and "d". Choice "c" is incorrect. The desktop is a client, not a server. Choice "d" is incorrect. Client/server architecture does not include hardware in the architecture. That eliminates both choices "b" and "d". CPA-05175 Type1 M/C A-D Corr Ans: D PM#37 B 4-03 48. CPA-05175 Page 17 TakeItBack Company outsourced its computer operations in 1970. It had so many problems with its outsourcing vendor that it finally decided to terminate the contract and take over its operations again. Which of the following statements is/are correct with respect to the hardware that it may install in its new data center that it has just built? a. TakeItBack is investigating RAID disk storage for its disk storage needs. RAID is inexpensive disk drives that are combined in an array of disk drives. TakeItBack is aware of the old adage of "You get what you pay for" and is willing to accept the performance and reliability problems of RAID in exchange for the lower price. b. TakeItBack has decided to buy and install 40GB of virtual memory on its main processor. It has designed the main computer room in its new data center to provide the space for this virtual memory. c. TakeItBack has decided to utilize tape storage for all of its online systems since tape drives are random storage devices. Even though tape random access is slower than disk random access, tape storage will work just fine for its online systems. d. None of the statements is correct. CPA-05175 Explanation Choice "d" is correct. All three statements are nonsense. Possibly TakeItBack should just have looked for another outsourcing vendor if it was dissatisfied with its outsourcing center. It certainly does not know enough about hardware to equip and run its own data center. RAID disk storage, while relatively inexpensive, does not necessarily mean lower performance and reliability. Virtual memory is not real memory; it is software controlled. There is nothing to install. TakeItBack wasted its money on floor space for the virtual memory. There is really no such thing as tape random access. Tape storage is sequential. Tape storage would not be used in online systems, other than possibly for batch parts of the online systems or for backup and recovery. Disk storage is required for online systems. Choices "a", "b", and "c" are incorrect, per the above explanation. CPA-05176 Type1 M/C A-D Corr Ans: D PM#38 B 4-03 49. CPA-05176 Page 18 LotsofPower Corporation is looking to replace some or all of the processors in its computer center. Which of the following statements that LotsofPower has received from its computer hardware sales representatives is correct? a. Processing power is often described in terms of MIPS. The MIPS measurement of processors is the sole factor in determining the overall processing power of a particular processor or computer system. 23 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. Multiprocessing is several parts of a program running at the same time on a single processor. c. Multiprogramming is the coordinated processing of programs by more than one processor. d. None of the statements is correct. CPA-05176 Explanation Choice "d" is correct. None of the statements is correct. It is correct that processing power is often described in terms of MIPS. However, the MIPS measurement is only one of the factors in determining the overall processing power of a particular processor or computer system. For example, the internal and external (to the processor itself) data transfer speed is also important. If a particular application system is input/output intensive, like many commercial application systems are, data transfer speed might be much more important than pure processing power. Multiprogramming, not multiprocessing, is several parts of a program running at the same time on a single processor. In multiprogramming, since there is only one processor, only one part of a program can actually run at a single point in time. Multiprogramming takes advantage of a wait state with one program (where the program is waiting for something else like relatively slow input/output) to switch to another program. It then looks like several programs are running at the same time even though they are not. Choices "c" and "d" are backwards. Multiprocessing, not multiprogramming, is the coordinated processing of programs by more than one processor. In multiprocessing, several programs are run at the same time. In parallel processing, there are multiple processors that share the execution of an individual program; the program is split into pieces and the multiple pieces of the single program are run concurrently by the multiple processors. This capability will benefit programs that are written to take advantage of it. Choices "c" and "d" are backwards. Choices "a", "b", and "c" are incorrect, per the above explanation. CPA-05177 Type1 M/C A-D Corr Ans: D PM#39 B 4-03 50. CPA-05177 Page 21 Stonehenge Corporation utilizes several database management systems in its various application systems running at data center just north of London, England. Which of the following statements is/are correct for these databases? I. In a relational database, the data are stored in two-dimensional tables that are implemented by indexes and linked lists. II. Normalization is the process of separating data into logical tables. III. Object-oriented databases can be used to store comments, drawings, images, voice, and video that do not normally fit into more structured databases. Object-oriented databases are normally faster than relational databases. a. b. c. d. I, II, and III are correct. III only is correct. II and III only are correct. II only is correct. CPA-05177 Explanation Choice "d" is correct. II only is correct. Statement I is incorrect. In a relational database, the data are stored in two-dimensional tables that are related to each other by keys, not implemented by indexes and linked lists. Indexes and linked lists were normally used in the earlier hierarchical and tree-structured databases. Statement II is correct. Normalization is the process of separating data into logical tables. Data normalization is required before a relational database can be designed. 24 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Statement III is incorrect. Object-oriented databases can be used to store comments, drawings, images, voice, and video that do not normally fit into more structured databases. However, object-oriented databases are normally slower than, not faster than, relational databases. Choices "a", "b", and "c" are incorrect, per the above explanation. CPA-05178 Type1 M/C A-D Corr Ans: A PM#40 B 4-03 51. CPA-05178 Page 25 CoffeeEverywhere Corporation, headquartered in Seattle, Washington, uses a variety of programming languages in its various application systems. Which of the following statements is not correct with respect to programming languages? a. Programs may be either interpreted or compiled. When programs are compiled, each line of source code is converted into executable code immediately before it is executed. b. Examples of modern programming languages are C++ and Java. c. Fourth-generation languages are languages that enable end users to develop applications with little or no technical assistance. d. Programs are normally written in source code that is then translated into object code. CPA-05178 Explanation Choice "a" is correct. Programs may be either interpreted or compiled. However, when programs are interpreted, not compiled, each line of source code is converted into executable code immediately before it is executed. Interpretation is normally slower than compilation because it is harder to optimize (for performance) an interpreted program. Optimization normally is part of the compilation or linking process. Choice "b" is incorrect. Examples of modern programming languages are C, C++, Visual Basic, and Java. Java is a programming language. If a computer has a Java interpreter, compiled Java modules can be run on that computer. Java modules can be embedded on web pages and can be downloaded to a web browser and run on a client computer. Java, from a programming standpoint, is somewhat like C and C++; however, programs written in Java are more portable (from one vendor's computer to another in executable form) than C or C++ programs. C and C++ are really not all that portable since different programming language vendors tend to include "special features" in their programming languages. Choice "c" is incorrect. Fourth-generation languages are languages that enable end users to develop applications with little or no technical assistance. That does not necessarily mean that untrained end users will really be able to write good or efficient programs or applications, just that they may be able to write them. Choice "d" is incorrect. Programs are normally written in source code that is then translated into object code. The translation is the compilation or interpretation of the source code. If a program is compiled, broadly speaking, the object code is retained and is what is executed. If a program is interpreted, the interpreted code is what executes. If the program is executed again, it is interpreted again. CPA-05179 Type1 M/C A-D Corr Ans: A PM#41 B 4-03 52. CPA-05179 Page 26 Left Bank of the Mississippi is a leading bank headquartered in East St. Louis, Illinois. The bank has operated for years with an old deposit accounting system and is looking to replace that system with a new and more modern system purchased from an outside application software vendor that supplies software to the banking community. Which of the following statements is/are correct? a. If Left Bank purchases the software, normally it will actually have purchased only a license to use that software. Its license will be subject to the terms and conditions written into the license agreement. b. If Left Bank purchases the software, it will automatically have the right to have the software source code escrowed with an escrow agent of some type. Escrowing of the source code protects the purchaser if the software vendor fails to live up to its contractual obligations. 25 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 c. The new deposit accounting system will probably fall under the definition of groupware because it will be used by groups of customers. d. None of the statements is correct. CPA-05179 Explanation Choice "a" is correct. If Left Bank purchases the software, normally it will actually have purchased only a license to use that software. Its license will be subject to the terms and conditions written into the license agreement. The license agreement for a large application system (such as a deposit accounting system) will be considerably different from the shrink-wrap license agreement that is used for PC software. Choice "b" is incorrect. If Left Bank purchases the software, it will not automatically have the right to have the software source code escrowed with an escrow agent; an escrow agreement will have to be written into the license agreement. In addition, it is questionable exactly how much the escrowing of the source code protects the purchaser if the software vendor fails to live up to its contractual obligations. Choice "c" is incorrect. The new deposit accounting system will not probably fall under the definition of groupware because it will be used by groups of customers. Groupware is software that lets different people work on the same documents and coordinate their work activities. It is extremely unlikely that a deposit accounting system will perform this function. Besides, what are "groups" of customers? Choice "d" is incorrect since choice "a" is correct. CPA-05245 Type1 M/C A-D Corr Ans: C PM#42 B 4-03 53. CPA-05245 Released 2006 Page 34 Compared to batch processing, real-time processing has which of the following advantages? a. b. c. d. Ease of auditing. Ease of implementation. Timeliness of information. Efficiency of processing. CPA-05245 Explanation Choice "c" is correct. Compared to batch processing, real-time processing has the advantage of timeliness of information because data is updated more quickly. Choice "a" is incorrect. Auditing is normally easier with a batch system than with an online system. With an online system, it is harder, although certainly not impossible, to build effective audit trails. With less effective audit trails, it is more difficult to audit, and sometimes considerably different approaches to auditing (auditing around a system instead of auditing through a system) must be taken. Choice "b" is incorrect. There is no real difference in general between the ease of implementation of a batch system and of an online system; although, there might be a difference between a specific batch system and a specific online system. Choice "d" is incorrect. There is no real difference in general between the efficiency of processing between a batch system and an online system; although, there might be a difference between a specific batch system and a specific online system. It is difficult to determine exactly what the examiners actually meant by "efficiency of processing." CPA-05257 Type1 M/C A-D Corr Ans: A PM#43 B 4-03 54. CPA-05257 Released 2006 Page 23 Which of the following is a critical success factor in data mining a large data store? a. b. c. d. Pattern recognition. Effective search engines. Image processing systems. Accurate universal resource locater (URL). 26 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-05257 Explanation Choice "a" is correct. Data mining can be defined as the extraction of implicit, previously unknown, and potentially useful information from data. It is usually associated with an organization's need to identify trends. Data mining involves the process of analyzing the data to show patterns or relationships in that data. Thus, pattern recognition, or the ability of the data mining software to recognize the patterns (or trends), is the critical success factor for data mining (at least in the opinion of the examiners). Choice "b" is incorrect, per the examiners. An effective search engine is a critical success factor in data mining especially when the data store (a nice techie word meaning the database) is really large (and it is in this question). Unless the search engine is effective, the data mining process might take a very, very long time, but it should eventually provide results. That may be the reason why the examiners did not think that this answer was correct. Not all of the questions on the CPA exam are good. The question asks for "a" critical success factor, not "the" critical success factor. In our opinion, both choice "a" and choice "b" should be correct. Choice "c" is incorrect. An image processing system is not a critical success factor in data mining. Image processing systems are more oriented towards the gathering of data from images, and not towards the mining or interpretation of that data. Choice "d" is incorrect. An accurate universal resource locator (URL) is not a critical success factor in data mining. A URL is a string of characters conforming to a standardized format which refers to a resource on the Internet. Data for data mining purposes is seldom, if ever, on the Internet. That would be way too slow. CPA-05563 Type1 M/C A-D Corr Ans: A PM#44 B 4-03 55. CPA-05563 Released 2007 Page 36 A distributed processing environment would be most beneficial in which of the following situations? a. Large volumes of data are generated at many locations and fast access is required. b. Large volumes of data are generated centrally and fast access is not required. c. Small volumes of data are generated at many locations, fast access is required, and summaries of the data are needed promptly at a central site. d. Small volumes of data are generated centrally, fast access is required, and summaries are needed monthly at many locations. CPA-05563 Explanation Choice "a" is correct. A distributed (or decentralized) processing environment would be the most beneficial when large volumes of data are generated at many (remote) locations and fast access to the data is required. In centralized processing, there is always some delay (however small these days) in transmitting large volumes of data or transactions to the central site to be processed and then to be able to access the processed information. Decentralized processing eliminates that particular problem (although it does present other problems). Note that there seems to be an implied assumption in this question that the (remote) locations need access only to their own local data and not to all of the data for all locations. This choice seems to be better than choice "c". Choice "b" is incorrect. If large volumes of data are generated centrally, centralized processing would probably be more beneficial, regardless of whether or not fast access to that data is required. This choice implies that little, if any, data or transactions are generated at the remote locations so there would be no real need for distributed processing. Choice "c" is incorrect. If summaries of the data are needed "promptly" at the central site, centralized processing MIGHT be more beneficial. Since only small volumes of data are generated at the remote locations, there would probably not be much delay in transmitting that data to the central location and probably not much delay in accessing that data. Since only summaries of the data are needed at the central location, those summaries could probably be readily prepared at the remote locations. This choice is the next best, and a case could certainly be made that the choice is correct. The decision could readily come down to summaries of "what" data. Is it summaries of all of the data generated by all 27 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 locations or summaries of only the data generated by the remote location? If the former is what is meant, centralized processing would be more beneficial. If the latter is what is meant, distributed processing would probably be more beneficial. Choice "d" is incorrect. If summaries of the data are needed "monthly" at the remote sites, centralized processing MIGHT be more beneficial. However, there is no way to tell in this choice how much data is generated at the remote locations. From the way the question in total is written, an assumption might be made that there is only a small volume of data at the remote locations. If there is a large volume of data at the remote locations, decentralized processing might be more beneficial because fast access is required. Note: This question is rather vague and ambiguous. Candidates should not have to make too many assumptions or read too much into the question. Unfortunately, with this question, you do. CPA-05575 Type1 M/C A-D Corr Ans: C PM#45 B 4-03 56. CPA-05575 Released 2007 Page 28 Which of the following statements is true regarding Transmission Control Protocol and Internet Protocol (TCP/IP)? a. b. c. d. Every TCP/IP-supported transmission is an exchange of funds. TCP/IP networks are limited to large mainframe computers. Every site connected to a TCP/IP network has a unique address. The actual physical connections among the various networks are limited to TCP/IP ports. CPA-05575 Explanation Choice "c" is correct. TCP/IP is the network protocol upon which the Internet is based. Knowing only that, some or all of the incorrect choices can be readily eliminated. If nothing else, the odds of guessing correctly are improved. There is detail on TCP/IP in the B4 Technical Addendum; however, TCP/IP is not discussed in the main text. The "addresses" referenced in this choice refer to network addresses, which are unique. Network addresses are discussed in the B4 Technical Addendum also; they are not discussed in the main text. Choice "a" is incorrect. TCP/IP is not limited to exchanges of funds. The Internet is used for a lot more than just exchanges of funds, although it is certainly used for that. Knowing only that TCP/IP is the basis for the Internet, and nothing else, this choice can be readily eliminated. Choice "b" is incorrect. TCP/IP is not limited to large (or even small) mainframe computers. It can and is used by any type of computer. Knowing only that TCP/IP is the basis for the Internet, and nothing else, this choice can be readily eliminated. Choice "d" is incorrect. The actual physical connections among the various networks are not limited to TCP/IP ports. There are plenty of other "ports" that are used for Internet communications. Ports are discussed in the B4 Technical Addendum; they are not discussed in the main text. This choice is probably the next best choice since it takes just a little more knowledge to eliminate it. Note: Remember that the B4 Technical Addendum should be a part of your review for the CPA Exam! CPA-05585 Type1 M/C A-D Corr Ans: B PM#46 B 4-03 57. CPA-05585 Released 2007 Page 34 What type of computerized data processing system would be most appropriate for a company that is opening a new retail location? a. b. c. d. Batch processing. Real-time processing. Sequential-file processing. Direct-access processing. CPA-05585 Explanation 28 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "b" is correct. In this question, a new "retail" location is being opened. Retail locations will normally have a large number of small transactions (think of a convenience store selling beer and chips), and that might make batch processing look to be most appropriate. However, it is important to know the current status of inventory so that inventory (what is and what is not selling) can be properly replenished (think of Walmart and its supply chain systems) and so that quick price reductions can be made for inventory that is not selling. This last factor makes real-time processing most appropriate. Choice "a" is incorrect. There is nothing wrong with batch processing, but batch processing would probably not be used these days in the situation described in the question. In the past, batch processing was used to upload transaction data from individual stores to the retailer's centralized processors (with the remainder of the processing being done centrally and possibly in batch); however, real time processing would be better (and more expensive). This kind of decision is almost always a cost/benefit decision. It would certainly be possible, in this situation, to have the retail store transactions uploaded after the close of business in batch, further processing of the transactions to be done centrally in batch, and new inventory figures transmitted back to the store in batch after the central processing is complete. Choice "c" is incorrect. Sequential file processing is almost totally restricted to batch processing. Sequential file processing was used extensively in the "good old days" but it is seldom used these days for major application files, which are almost always disk files and allow direct access. Tapes (which are the normal sequential files) are normally restricted to backups and storage for very large amounts of data that are too expensive to be stored on disk and for which there is no real need for relatively quick access. Choice "d" is incorrect. This choice would have been better worded as "direct access file" processing (or it means absolutely nothing). Reworded, direct access file processing is the opposite of sequential file processing. It would most certainly be used in the "retail" applications, but that does not mean it is the correct answer. Risks, Controls, Disaster Recovery, and Business Continuity CPA-03483 Type1 M/C 58. CPA-03483 BEC C03 #5 A-D Corr Ans: D PM#1 B 4-04 Page 41 All of the following are different types of reporting risk that an accountant must recognize as threats to accuracy of reports, except: a. b. c. d. Strategic risk. Financial risk. Information risk. Data integrity risk. CPA-03483 Explanation Choice "d" is correct. There is no separate data integrity risk category. Choice "a" is incorrect. Strategic risk includes risks such as choosing inappropriate technology. Choice "b" is incorrect. Financial risk includes risks such as having financial resources lost, wasted, or stolen. Choice "c" is incorrect. Information risk includes risks such as loss of data integrity, incomplete transactions, or hackers. CPA-03622 Type1 M/C 59. CPA-03622 BEC C03 #15 A-D Corr Ans: C PM#2 B 4-04 Page 45 The system of user identification and authentication that prevents unauthorized users from gaining access to network resources is called a: a. Login ID and password. b. Network server. c. Firewall. 29 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 d. Network force field. CPA-03622 Explanation Choice "c" is correct. A firewall is a system of user identification and authentication that prevents unauthorized users from gaining access to network resources. This name may also be applied to a network node used to improve network traffic and to set up a boundary that prevents traffic from one segment from crossing over to another. The most common use is to prevent Internet users from gaining access to an organization's private intranet. Choice "a" is incorrect. A login ID and password are normally required to allow access to a network resource, but it is the firewall that protects the network and prevents unauthorized access. Choice "b" is incorrect. A network server is a type of resource protected by the firewall. Choice "d" is incorrect. There is no such thing as a network force field. CPA-03631 Type1 M/C 60. CPA-03631 Au R98 #25 A-D Corr Ans: B PM#6 B 4-04 Page 51 Which of the following procedures would an entity most likely include in its computer disaster recovery plan? a. b. c. d. Develop an auxiliary power supply to provide uninterrupted electricity. Store duplicate copies of critical files in a location away from the computer center. Maintain a listing of all entity passwords with the network manager. Translate data for storage purposes with a cryptographic secret code. CPA-03631 Explanation Choice "b" is correct. Maintaining current, off-site copies of critical data and program files is a fundamental part of any disaster recovery plan. Choice "a" is incorrect. An auxiliary power supply would prevent loss of power and possible loss of data. Choice "c" is incorrect. This is a distractor. Decipherable password lists should not be maintained. Choice "d" is incorrect. Using data encryption would prevent unauthorized use of information even if data access controls failed. CPA-03633 Type1 M/C 61. CPA-03633 Au May 93 #8 A-D Corr Ans: B PM#7 B 4-04 Page 51 Which of the following controls most likely would ensure that an entity can reconstruct its financial records? a. b. c. d. Hardware controls are built into the computer by the computer manufacturer. Backup diskettes or tapes of files are stored away from originals. Personnel who are independent of data input perform parallel simulations. System flowcharts provide accurate descriptions of input and output operations. CPA-03633 Explanation Choice "b" is correct. Backup diskettes or tapes of files stored away from originals would enable an entity to reconstruct its financial records if the originals were destroyed. Choice "a" is incorrect. Hardware controls affect the processing and transfer of information within the system. They do not enable the entity to reconstruct its financial records. Choice "c" is incorrect. Parallel simulation is an auditing technique used when auditing through the computer. It does not allow an entity to reconstruct its financial records. Choice "d" is incorrect. System flowcharts could provide accurate descriptions of input and output operations but would not assist in the reconstruction of financial records. 30 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-04608 Type1 M/C 62. CPA-04608 BEC C05 #11 A-D Corr Ans: B PM#8 B 4-04 Page 43 Which of the following statements is (are) correct for access controls? I. Access controls limit access to program documentation, data files, programs, and computer hardware. II. Passwords should consist of words that can be found in a common dictionary and should be of a maximum length so that they can be easily remembered. III. A backdoor is a means of access to a program or system that bypasses normal security mechanisms. Backdoors should be maintained so that there can be quick access to the system or program for emergency situations. a. b. c. d. I and II only are correct. I only is correct. III only is correct. II and III only are correct. CPA-04608 Explanation Choice "b" is correct. Statement I is the only correct statement. Access controls limit access to program documentation, data files, programs, and computer hardware. Statement II is incorrect. Passwords should not consist of words that can be found in a common dictionary and should be of a minimum, not a maximum, length. Statement III is incorrect. A backdoor is a means of access to a program or system that bypasses normal security mechanisms. Backdoors should be eliminated. CPA-04609 Type1 M/C 63. CPA-04609 BEC C05 #12 A-D Corr Ans: C PM#9 B 4-04 Page 45 Which of the following statements is (are) incorrect for firewalls? I. A firewall is a system of user identification and authentication that prevents unauthorized users from gaining access to network resources. II. Firewall methodologies can be divided into packet filtering, circuit level gateways, and application level gateways. Packet filtering examines packets of data as they pass through the firewall according to rules that have been established. III. Application firewall is another name for network firewall. They perform the same function. IV. None of the listed statements are incorrect. a. b. c. d. I only is correct. II only is correct. III only is correct. IV only is correct. CPA-04609 Explanation Choice "c" is correct. An application firewall, as opposed to a network firewall, is designed to protect specific application services from attack. CPA-04610 Type1 M/C 64. CPA-04610 BEC C05 #13 A-D Corr Ans: A PM#10 B 4-04 Page 47 Which of the following statements is incorrect for threats in a computerized environment? a. A virus is a piece of computer program that inserts itself into some other program to propagate. Alternatively, it can run independently. 31 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 b. A Trojan horse is a program that appears to have a useful function but that contains a hidden and unintended function that presents a security risk. c. Phishing is the sending of phony emails to try to lure people to phony web sites asking for financial information. d. In a denial-of-service attack, one computer bombards another computer with a flood of information intended to keep legitimate users from accessing the target computer or network. CPA-04610 Explanation Choice "a" is correct. This statement is incorrect. A virus is a piece of computer program that inserts itself into some other program to propagate. A virus cannot run independently. Choices "b", "c", and "d" are incorrect because these statements are correct. CPA-04808 Type1 M/C A-D Corr Ans: C PM#11 B 4-04 65. CPA-04808 2005 Released Page 42 Which of the following types of control plans is particular to a specific process or subsystem, rather than related to the timing of its occurrence? a. b. c. d. Preventive. Corrective. Application. Detective. CPA-04808 Explanation Choice "c" is correct. Application controls are written into the application and are specific to the particular process or subsystem. The words "specific to the particular process or subsystem" almost give it away. The words "process" and "subsystem" are quite similar to the word "application." Choices "a", "b", and "d" are incorrect. Preventive, corrective, and detective controls are control procedures that are part of the control environment. â—Ź Preventive Controls - Preventive controls are controls that are designed to prevent potential problems from occurring. â—Ź Corrective Controls - Corrective controls are controls that are designed to fix problems that have occurred and that have been located by detective controls. â—Ź Detective Controls - Detective controls are controls that are designed to locate problems that have occurred so that they can be fixed by corrective controls. CPA-04813 Type1 M/C A-D Corr Ans: B PM#12 B 4-04 66. CPA-04813 2005 Released Page 51 Which of the following procedures should be included in the disaster recovery plan for an Information Technology department? a. b. c. d. Replacement personal computers for user departments. Identification of critical applications. Physical security of warehouse facilities. Cross-training of operating personnel. CPA-04813 Explanation Choice "b" is correct. This question is not straightforward because a case can be made that several of the choices are correct. However, as usual, one of the choices is more correct than the others. The identification of critical applications will be found in almost all disaster recovery plans and thus is the best answer. 32 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "a" is incorrect. Replacement of PCs could be in some disaster recovery plans, even though when it is, the plan is more likely to be called a business continuity plan. If end users cannot use their PCs because the PCs have been destroyed, they might not be able to access the recovered applications. However, PCs can be readily purchased, and many firms will decide to purchase replacements only when they need to (depending on the nature and extent of the disaster, the end users might be able to move to an alternate location which still has its PCs). However, that approach should probably be documented in the disaster recovery plan. Choice "b" is just better. Choice "c" is incorrect. It is there to try to trick people into picking it because of the word "warehouse." After all, we do have "data warehouses." Choice "d" is incorrect. Cross-training could be in some disaster recovery plans, assuming that the "operating personnel" means computer operations personnel (if it means something else, it won't be). Cross-training of computer operations personnel (anybody who will be expected to be at the disaster recovery site to provide the care and feeding of the applications) might be appropriate because the disaster might keep some of the expected people from being there. If so, then the cross-training should be documented in the disaster recovery plan. Replacement of personnel is something that is often incorrectly ignored in disaster recovery plans. CPA-04814 Type1 M/C A-D Corr Ans: A PM#13 B 4-04 67. CPA-04814 2005 Released Page 50 A digital signature is used primarily to determine that a message is: a. b. c. d. Unaltered in transmission. Not intercepted in route. Received by the intended recipient. Sent to the correct address. CPA-04814 Explanation Choice "a" is correct. A digital signature is a means of ensuring that a message is not altered in transmission. It is a form of data encryption. Choice "b" is incorrect. A digital signature will not keep a message from being intercepted in route, any more than a normal signature would. Choice "c" is incorrect. A digital signature will not ensure that a message is received by the intended recipient, any more than a normal signature would. Choice "d" is incorrect. A digital signature will not ensure that a message is sent to the correct address, any more than a normal signature would. CPA-04826 Type1 M/C A-D Corr Ans: C PM#14 B 4-04 68. CPA-04826 2005 Released Page 37 Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system: a. b. c. d. Does not require as stringent a set of internal controls. Will produce a more accurate set of financial statements. Will be more efficient at producing financial statements. Eliminates the need to reconcile control accounts and subsidiary ledgers. CPA-04826 Explanation Choice "c" is correct. A computer-based system will almost always be "more efficient" in doing something that has to be done multiple times. Thus, if multiple financial statements have to be produced, for example, at multiple times during the closing process, a computer-based system will normally be more efficient. 33 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "a" is incorrect. A computer-based system requires a set of internal controls that are just as stringent as a manual system. The controls will be different, but that does not mean they will be less stringent. Choice "b" is incorrect. There is nothing about a computer-based system that guarantees increased accuracy. Garbage in = garbage out. Choice "d" is incorrect. There is nothing about a computer-based system that eliminates the need to reconcile control accounts and subsidiary ledgers. Computer systems (really the programs in those systems) make mistakes sometimes; they are called bugs. So, if such a reconciliation were needed in a manual system, it would probably still be needed in a computer-based system, just for different reasons. However, it should be able to be automated. CPA-04827 Type1 M/C A-D Corr Ans: D PM#15 B 4-04 69. CPA-04827 2005 Released Page 45 Which of the following risks can be minimized by requiring all employees accessing the information system to use passwords? a. b. c. d. Collusion. Data entry errors. Failure of server duplicating function. Firewall vulnerability. CPA-04827 Explanation Choice "d" is correct, or it is the best of the answers. It is certainly questionable whether a firewall vulnerability would be compensated for by requiring all employees to use passwords, but choice "d" is much better than the other answers. Choice "a" is incorrect. Collusion would not be minimized at all by requiring employees to have passwords; the employees conspiring to do bad things could merely share their passwords. Choice "b" is incorrect. Passwords would not do anything about data entry errors. Choice "c" is incorrect. It is difficult to determine what "failure of server duplicating function" even means, but, certainly, whatever it is, the usage of passwords or the lack of passwords would have no effect on it. CPA-05181 Type1 M/C A-D Corr Ans: D PM#16 B 4-04 70. CPA-05181 Page 44 Splendora Corporation, a corporation headquartered in Texas, is in the energy business. Since large amounts of money are involved, Splendora needs to have tight security for its data and application systems. Which of the following statements about its security might indicate a weakness in the security? a. A backdoor is a means of access that bypasses normal security procedures. Splendora controls access to its data center with access cards that log all employees who enter the computer center, so it does not feel that it has any backdoors. b. Splendora generates a default password for new users of its application systems as the employee's last name and encourages but does not require that those passwords be changed. Splendora considers the possibility of a security problem to be remote since employees will invariably change those passwords as soon as they access the systems for the first time. c. Splendora has a network firewall that protects access to its firewall and the applications that run on its networks. Since firewalls protect against intrusion by outsiders, Splendora does not utilize any virus protection software. d. Each of the statements indicates a potential weakness in Splendora's security. CPA-05181 Explanation 34 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "d" is correct. Each of the above statements indicates a potential weakness in Splendora's security. Choice "a" is incorrect. It indicates a weakness in Splendora's security. A backdoor is a means of access to a program or system that bypasses normal security procedures. It has nothing whatsoever to do with physical access to the data center, regardless of the arrangement of the doors to the data center. Splendora should be concerned. This statement is merely a play on words. Choice "b" is incorrect. It indicates a weakness in Splendora's security. There is nothing necessarily wrong with generating default passwords as an employee's last name. However, assuming that new employees will invariably change those passwords as soon as they access the application systems for the first time is naïve at best. Some employees will change the passwords; others will be too busy (or too lazy). A change of the default passwords should be required within a very limited period of time after the passwords are assigned. This requirement is very easy to implement and should definitely be implemented in this case since there is a need to have tight security. Choice "c" is incorrect. It indicates a weakness in Splendora's security. A network firewall protects access to a network and not to an application that runs on the network; an application firewall does that. There is nothing to indicate that Spendora's firewall does both. In addition, firewalls protect against intrusion by outsiders and do nothing whatsoever to protect against viruses. CPA-05182 Type1 M/C A-D Corr Ans: B PM#17 B 4-04 71. CPA-05182 Page 46 Newt Corporation, headquartered in Los Angeles, is a nationwide provider of educational services to post-graduate students. Due to stringent federal guidelines for the protection of student information, Newt utilizes various firewalls to protect its network from access by outsiders. Which of the following statements with respect to firewalls is/are correct? a. Packet filtering examines packets of data as they pass through the firewall. Packet filtering is the most complex type of firewall configuration. b. Circuit level gateways only allow data into a network that result from requests from computers inside the network. c. Application level gateways examine data coming into the gateway. They can be used to control which computers in a network can access the Internet but cannot be used to control which Internet websites or pages can be viewed once access is allowed. d. All of the statements are correct. CPA-05182 Explanation Choice "b" is correct. Circuit level gateways, not packet filtering, only allow data into a network that result from requests from computers inside the network by keeping track of requests that are sent out of the network and only allowing data in that is in response to those requests. Choice "a" is incorrect. Packet filtering examines packets of data as they pass through the firewall. Packet filtering is the simplest, not the most complex, type of firewall configuration. Choice "c" is incorrect. Application level gateways examine data coming into the gateway. They can be used to control which computers in a network can access the Internet and can be used to control which Internet websites or pages can be viewed once access is allowed. Choice "d" is incorrect. Choice "b" is correct. CPA-05183 Type1 M/C A-D Corr Ans: D PM#18 B 4-04 72. CPA-05183 Page 47 Minnesota Corporation is a company that manufactures and distributes snowmobiles throughout the northern part of the U.S. and Canada. Minnesota has a data center in Alabama where it runs the 35 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 computer systems that control its business. Minnesota feels that it has excellent security in all aspects of its operation. Which of the following statements is/are correct? a. A virus is a piece of computer program that inserts itself into some other program. Virus protection software can be utilized to protect against viruses. One of the benefits of such software is that it can be installed and forgotten, allowing security personnel to devote their attention to other areas. b. A denial-of-service attack is an attack in which one computer bombards another computer with a flood of information. c. Phishing is the sending of phony emails to try to convince people to divulge information. d. Choices "b" and "c" are correct. CPA-05183 Explanation Choice "d" is correct, which means that both "b" and "c" are incorrect. Choice "a" is incorrect. A virus is a piece of computer program that inserts itself into some other program. Virus protection software can be utilized to protect against viruses. One of the benefits of such software is definitely not that it can be installed and forgotten. Virus protection software must be continually updated because new viruses are being continually developed. Security personnel who install and forget virus protection software will soon be looking for new jobs. Choice "b" is incorrect. A denial-of-service attack is an attack in which one computer bombards another computer with a flood of information intended to keep legitimate users from accessing the target computer or network. Choice "c" is incorrect. Phishing is the sending of phony emails to try to convince people to divulge information like account numbers and social security numbers. It is often accomplished by luring people to authentic-looking but fake websites. CPA-05184 Type1 M/C A-D Corr Ans: D PM#19 B 4-04 73. CPA-05184 Page 48 Lafayette Company is a corporation that conducts international trade between the U.S. and France. It operates several computer systems to account for and control its business. As a matter of corporate policy, it insists that all data entered into its systems pass rigorous data validation tests. Its accounting systems process their transactions in batch although the transactions themselves are actually entered and validated online. Which of the following statements with respect to such data validation is correct? a. Valid code tests are tests where codes entered are checked against valid values in a master file. Lafayette utilizes valid code tests on the dollar amounts in its transactions since it thinks that such tests are an effective control on the entry of the dollar amounts in its transactions. b. Lafayette uses check digits on all numeric fields when the data is initially entered. Lafayette thinks that check digits on all numeric fields are an effective control on the entry of the numeric fields in these transactions. c. Batch totals are used for the account numbers in all batches of transactions as they are entered. Lafayette thinks that such batch totals are an effective control on the entry of the account numbers in its transactions. d. None of the statements is correct. CPA-05184 Explanation Choice "d" is correct. None of the statements is correct. Choice "a" is incorrect. Valid code tests are tests where codes entered are checked against valid values in a master file. This definition is correct. However, Lafayette is incorrect in thinking that these valid code tests are an effective control on the entry of the dollar amounts in its transactions. Valid code tests are effective with fields when the correct values can be identified in advance and set up in the table. How can that be done with dollar amounts? It really can't. Choice "b" is incorrect. Lafayette uses check digits on all numeric fields when the data is initially entered. Lafayette is incorrect in thinking that check digits on all numeric fields are an effective control on the entry 36 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 of its transactions. Check digits can be effective on the entry of some numeric fields such as account numbers (and can be used with account numbers that are not totally numeric) that must follow a specific pattern. Check digits are not effective on the entry of dollar amounts since dollar amounts do not follow a specific pattern. Choice "c" is incorrect. Batch totals are used with all batches of transactions as they are entered. Lafayette is correct in thinking that batch totals are an effective control on the entry of its transactions. Batch totals can be used on dollar amounts even when the transactions are entered online. However, batch totals are not used on fields such as account numbers. If totals of account numbers (or any other non-dollar mounts) are used for batches of transactions, they are called hash totals. CPA-05185 Type1 M/C A-D Corr Ans: D PM#20 B 4-04 74. CPA-05185 Page 50 Kinney Corporation operates parking lots throughout the U.S. and Canada. Its computer systems are run at a data center in a newly redeveloped area of the South Bronx. On all of its application systems, Kinney uses program modification control software. Which of the following statements is correct for such program modification control software? a. Program modification controls are controls over the modification of programs being used in production applications. b. Program modification controls include both controls that attempt to prevent changes by unauthorized personnel and controls that track program changes so that there is an exact record of what versions of what programs were running in production at any specific point in time. c. Program change control software normally includes a software change management tool and a change request tracking tool. d. All of the statements are correct. CPA-05185 Explanation Choice "d" is correct. All of the statements are correct. Program modification controls are controls over the modification of programs being used in production applications. Program modification controls include both controls that attempt to prevent changes by unauthorized personnel and also that track program changes so that there is an exact record of what versions of what programs were running in production at any specific point in time. Program change control software normally includes a software change management tool and a change request tracking tool. Program change control often involves changing what are effectively the same programs in two different ways simultaneously. Normally, an environment has both production programs and programs that are being tested. Sometimes, production programs require changes (production fixes) at the same time the test versions of the same programs are being worked on. This process must be controlled so that one set of changes does not incorrectly overlay the other. Choices "a", "b", and "c" are incorrect, per the above explanation. CPA-05186 Type1 M/C A-D Corr Ans: D PM#21 B 4-04 75. CPA-05186 Page 51 Vulnerable Corporation has its data centers in Ft. Lauderdale, Miami, and Galveston. Since each of these locations is somewhat susceptible to hurricanes, Vulnerable is considering signing a disaster recovery contract with a disaster recovery service provider. Which of the following statements is/are correct for disaster recovery? I. Vulnerable uses application software packages. The license agreements for the packages invariably provide the right to make backup copies of the software for disaster recovery purposes. 37 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 II. Standard disaster recovery plans are limited to the restoration of IT processing. However, they may be extended to the restoration of functions in end user areas. III. The major emphasis in disaster recovery is normally the restoration of hardware and telecommunication services. a. b. c. d. I and II only are correct. I and III only are correct. I, II, and III are correct. II and III only are correct. CPA-05186 Explanation Choice "d" is correct. II and III only are correct. Statement I is incorrect. Vulnerable uses application software packages. The license agreements for the packages do not invariably provide the right to make backup copies of the software for disaster recovery purposes. Statement II is correct. Standard disaster recovery plans are limited to the restoration of IT processing. However, the plans may be extended to the restoration of functions in end user areas. Disaster recovery service providers will do almost anything related to disaster recovery for the right amount of money, as long as that service is specified (and priced) in the disaster recovery contract. Most disaster recovery service providers will not provide services that were not specified in the disaster recovery contract. If and when a disaster occurs, the customer normally gets what the customer has been paying for. Statement III is correct. The major emphasis in disaster recovery is normally the restoration of hardware and telecommunication services. CPA-05240 Type1 M/C A-D Corr Ans: D PM#22 B 4-04 76. CPA-05240 Released 2006 Page 47 Which of the following is a computer program that appears to be legitimate but performs an illicit activity when it is run? a. b. c. d. Redundant verification. Parallel count. Web crawler. Trojan horse. CPA-05240 Explanation Choice "d" is correct. A Trojan horse (like the wooden horse in Helen of Troy) is a program that appears to have a useful function but that contains a hidden and unintended function that presents a security risk (appears to be legitimate but performs an illicit activity when it is run). Choice "a" is incorrect. It is unclear what redundant verification is. One possibility if that it means verifying something twice to make sure that it is done once. This term is probably just made up. Choice "b" is incorrect. A parallel count appears to be the counting of bits in a parallel fashion. It appears to have something to do with digital circuits in digital clocks, watches, microwave ovens, VCRs, and the like. It is not a computer program. Choice "c" is incorrect. A web crawler (also known as a web spider or web robot) is a program which browses the web in a methodical, automated manner. Web crawlers are mainly used to create a copy of visited web pages for later processing by a search engine. Web crawlers can also be used for automating maintenance tasks on a web site. Web crawlers can also be used to gather specific types of information from web pages. There is nothing illicit about a web crawler. CPA-05244 Type1 M/C A-D Corr Ans: D PM#23 B 4-04 77. CPA-05244 Released 2006 Page 48 38 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Which of the following input controls would prevent an incorrect state abbreviation from being accepted as legitimate data? a. b. c. d. Reasonableness test. Field check. Digit verification check. Validity check. CPA-05244 Explanation Choice "d" is correct. A validity check (or valid code test) would prevent an incorrect state abbreviation from being accepted. The state abbreviation codes would be checked against valid values in a master file. Note the differences in terminology; different words may be used for the same thing. There is often no "standard" terminology in IT. Choice "a" is incorrect. A reasonableness test (check) is a data validation check on whether a data value has a certain relationship with other data values. There is no "relationship" with state abbreviations, at least in this question. However, as an additional verification, after the state abbreviation was determined to be a correct value (i.e., TX), the state abbreviation might be checked against the zip code to determine if the state contained the zip code; if not, one of them would be incorrect. There is no way to tell which one is incorrect, but at least there would be an indication of some kind of error. Choice "b" is incorrect. A field check is a data validation check performed on a data element to ensure that it is of the appropriate data type (alphanumeric, numeric, etc.). Unfortunately, a state abbreviation may be incorrect even if it is of the correct data type. Choice "c" is incorrect. It is unclear what a digit verification check actually is. A Google search failed to turn up anything, as did reference to several of the texts that the examiners have provided as references in the IT area. Perhaps the examiners are making up good sounding combinations of words for some of the wrong answers. CPA-05259 Type1 M/C A-D Corr Ans: A PM#24 B 4-04 78. CPA-05259 Released 2006 Page 48 In which of the following locations should a copy of the accounting system data backup of year-end information be stored? a. b. c. d. Secure off-site location. Data backup server in the network room. Fireproof cabinet in the data network room. Locked file cabinet in the accounting department. CPA-05259 Explanation Choice "a" is correct. The accounting system data backup of year-end information should certainly be stored in some kind of secure off-site location and not in any of the other listed locations. Choice "b" is incorrect. The accounting system data backup would certainly not be stored (only) on a data backup server in the network room. What if the server crashed completely and the data could not be recovered? What if the network room burned down? Choice "c" is incorrect. The accounting system data backup would certainly not be stored (only) in a fireproof cabinet in the data network room. The media to store the data might be more than would fit into a "cabinet" (many large corporations have hundreds of tapes of such data). It is nice that the cabinet is fireproof, but what about a flood or some other natural disaster? Choice "d" is incorrect. The accounting system data backup would certainly not be stored (only) in a locked file cabinet in the accounting department. The accounting department is not immune to fires, floods, and other natural disasters. CPA-05307 Type1 M/C A-D Corr Ans: C PM#25 B 4-04 39 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 79. CPA-05307 Released 2006 Page 48 A customer's order was never filled because an order entry clerk transposed the customer identification number while entering the sales transaction into the system. Which of the following controls would most likely have detected the transposition? a. b. c. d. Sequence test. Completeness test. Validity check. Limit test. CPA-05307 Explanation Choice "c" is correct. Of the choices listed, a validity check would most likely have detected a transposition in a customer identification number. In our text, we called that kind of edit check a valid code check or a validity check (Glossary). This kind of definition assumes that there is a master file of customer numbers somewhere to check customer numbers against. Of course, a check against such a file would not work to detect a transposition error if both the correct and the transposed customer numbers actually existed and were in the file. Often, a check digit that takes the order of the numbers or characters in the customer numbers into account can also be used. Choice "a" is incorrect. It is difficult to determine exactly what a sequence test means in this question. A Google search did not come up with anything specifically called a sequence test in a data validation context. Obviously, it could be some kind of test for a "sequence" of numbers, but it certainly would not work for customer numbers. A validity check would certainly be better. Choice "b" is incorrect. It is difficult to determine exactly what a completeness test means in this question. A Google search did not come up with anything specifically called a completeness test in data validation context. Obviously, it could be some kind of test for "completeness" of the customer numbers (e.g., are all of the digits there?), but it certainly would not be very effective for customer numbers. A validity check would certainly be better. Choice "d" is incorrect. A limit test is a check to determine if a data value is within certain limits. There might conceivably be a lower limit and an upper limit on customer numbers, but this type of test would not be worth much in that circumstance. A validity check would certainly be better. CPA-05311 Type1 M/C A-D Corr Ans: C PM#26 B 4-04 80. CPA-05311 Released 2006 Page 43 Which of the following statements best characterizes the function of a physical access control? a. b. c. d. Protects systems from the transmission of Trojan horses. Provides authentication of users attempting to log into the system. Separates unauthorized individuals from computer resources. Minimizes the risk of incurring a power or hardware failure. CPA-05311 Explanation Choice "c" is correct. The function of a physical access control is to separate unauthorized individuals from computer resources. Examples are locks on doors to computer rooms, etc. which limit physical access to computer resources to people who need such access in the performance of their job responsibilities. Choice "a" is incorrect. The function of a physical access control is not to protect systems from the transmission of Trojan horses. Trojan horses are software, and physical access controls would not have anything to do with them. Choice "b" is incorrect. The function of a physical access control is not to provide authentication of users attempting to log into the system; that would be done by some kind of a security system. Choice "d" is incorrect. The function of a physical access control is not to minimize the risk of incurring a power or hardware failure. A physical access control will do nothing to minimize the risk of power or hardware failures. 40 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-05326 Type1 M/C A-D Corr Ans: D PM#28 B 4-04 81. CPA-05326 Released 2006 Page 44 An auditor was examining a client's network and discovered that the users did not have any password protection. Which of the following would be the best example of the type of network password the users should have? a. b. c. d. trjunpqs. 34787761. tr34ju78. tR34ju78. CPA-05326 Explanation Choice "d" is correct. Of the choices listed, the best one is "tR34ju78" because it contains a combination of small letters, capital letters, and numbers. This password would be the most difficult to "crack." Choice "a" is incorrect. "trjunpgs" is not the best password because it is all small letters and not a combination of small letters, capital letters, and numbers. Choice "b" is incorrect. "34787761" is not the best password because it is all numbers and not a combination of small letters, capital letters, and numbers. Choice "c" is incorrect. "tr34ju78" is not the best password because it is just small letters and numbers and not a combination of small letters, capital letters, and numbers. CPA-05558 Type1 M/C A-D Corr Ans: B PM#28 B 4-04 82. CPA-05558 Released 2007 Page 45 Which of the following is an electronic device that separates or isolates a network segment from the main network while maintaining the connection between networks? a. b. c. d. Query program. Firewall. Image browser. Keyword. CPA-05558 Explanation Choice "b" is correct. A firewall is an "electronic device" (a firewall may actually be both hardware and software and not just hardware) that prevents unauthorized users from gaining access to network resources. A firewall isolates a private network of some type from a public network (or a network segment from the main network). It also maintains a (controlled) connection between those two networks. Choice "a" is incorrect. A query program has nothing to do with connecting networks or with separating or isolating a network segment from the main network. A query program is a program that allows a user to obtain information from a database or other data source. Choice "c" is incorrect. An image browser is a program that displays a stored graphical image. It has nothing to do with connecting networks or with separating or isolating a network segment from the main network. An image browser is used to display information from a database or other data source. Choice "d" is incorrect. In computer programming, a keyword is a word or identifier that has a particular meaning to the programming language being used. For example, some people have seen things like (IF…THEN) in some basic programming languages (FORTRAN, COBOL, Visual Basic, and many others). Both IF and THEN are keywords, and they cannot be used in that language out of their specified context. Alternatively, in a search, a keyword is a word that is used to find information somewhere that contains that word. Either way, however, a keyword has nothing to do with connecting networks or with separating or isolating a network segment from the main network. 41 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-05571 Type1 M/C A-D Corr Ans: C PM#29 B 4-04 83. CPA-05571 Released 2007 Page 51 To prevent interrupted information systems operation, which of the following controls are typically included in an organization's disaster recovery plan? a. b. c. d. Backup and data transmission controls. Data input and downtime controls. Backup and downtime controls. Disaster recovery and data processing controls. CPA-05571 Explanation Choice "c" is correct. It is difficult at best to figure out what the word "controls" is doing in any of these choices in a disaster recovery question. So let's just ignore it; it really does not make any difference to the answer. In addition, and more importantly, we have to make sure that we note the word "uninterrupted" in the question. We have to assume that the disaster recovery being referenced here is more stringent than either the hot site recovery or cold site recovery discussed in the text (i.e., the ability to recover from a disaster instantaneously with absolutely no downtime of any kind). This type of disaster recovery would normally be some kind of "mirror" facility, where two identical processing facilities are maintained at different geographical locations and all transactions are processed simultaneously at both facilities, and where either facility can take over instantaneously for the other if one is lost. This kind of disaster recovery is normally quite expensive, but it is sometimes worth it in some businesses. Downtime (or the complete lack thereof) is a key factor in the disaster recovery plan. Backup is always essential in any disaster recovery plan. Choice "c" is the only choice with both downtime and backup. Choice "a" is incorrect. Backup is always essential in any disaster recovery plan. These days, data transmission is an integral part of normal processing and of disaster recovery, and data transmission would definitely be important in any disaster recovery plan (normal data transmission has to be reestablished at the disaster recovery facility, and this sometimes is one of the more difficult things to do). However, this choice does not include the word "downtime" and this choice is thus not as good as choice "c" because it does not address the "uninterrupted" factor. Choice "b" is incorrect. Data input controls (and here the word does have meaning) have little to do with disaster recovery. Data input controls are an essential part of normal processing, and the normal controls would be available in the recovered applications once they are recovered. Downtime is addressed in this choice, but the inclusion of the data input controls makes this choice not as good as choice "c". Choice "d" is incorrect. It is difficult to determine what this choice even means, with or without the word "controls." It is, thus, not as good as choice "c". CPA-05584 Type1 M/C A-D Corr Ans: B PM#30 B 4-04 84. CPA-05584 Released 2007 Page 51 Which of the following configurations of elements represents the most complete disaster recovery plan? a. Vendor contract for alternate processing site, backup procedures, names of persons on the disaster recovery team. b. Alternate processing site, backup and off-site storage procedures, identification of critical applications, test of the plan. c. Off-site storage procedures, identification of critical applications, test of the plan. d. Vendor contract for alternate processing site, names of persons on the disaster recovery team, offsite storage procedures. CPA-05584 Explanation Choice "b" is correct. All of the factors listed in the various choices are important for disaster recovery, but this question asks for the "most complete" disaster recovery plan. Any disaster plan must include an alternate processing site (of some kind), backup (of some kind) of programs and data, and a test of the plan. Normally, there must be some identification of critical applications; although, it is certainly possible 42 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 in certain situations for "all" applications to be considered critical. This choice contains all of the required factors and is, thus, the best choice. Choice "a" is incorrect. A vendor contract for an alternate processing site is normally included in a disaster recovery plan; however, it is possible for an organization to use its own facilities so that an outside vendor is not necessary. The names of persons on the disaster recovery team are not essential; the individuals involved could be identified by position and not by name. Also, testing of the plan must be included in the disaster recovery plan, and it is not in this choice. Choice "c" is incorrect. A disaster recovery plan has to include some sort of alternate processing site, and this choice does not include that factor. In addition, backup is missing. Offsite storage tends to imply backup (since there has to be something to store offsite), but backup is not specifically included. So this choice is thus not as good as choice "b". Choice "d" is incorrect. An alternate processing site, backup, and testing are not included in this choice. Electronic Business CPA-03652 Type1 M/C 85. CPA-03652 4D.C02 - 7 A-D Corr Ans: A PM#3 B 4-05 Page 57 Management accountants often access the website for the Institute of Management Accountants and order publications from that organization. As part of that process, they provide their name and address and a password establishing their identity and provide credit or debit card information to pay for goods purchased. Use of the Internet to effect purchases of this type is called: a. b. c. d. E-Commerce. Electronic Data Interchange (EDI). E-Mail. Enterprise Resource Planning (ERP). CPA-03652 Explanation Choice "a" is correct. Ordering goods or services over the Internet from a corporate website is an example of e-commerce. Choice "b" is incorrect. Electronic Data Interchange (EDI) typically occurs between parties with a previous relationship normally over a privately owned value added network, not the Internet. However, use of the Internet for EDI is becoming more common. Choice "c" is incorrect. E-mail is a form of electronic communication not necessarily a medium in which to transact exchange transactions. Choice "d" is incorrect. CPA-03654 Type1 M/C 86. CPA-03654 4D.C02 - 8 A-D Corr Ans: C PM#4 B 4-05 Page 57 Transactions between businesses are frequently handled through electronic media. Business to business transactions, often called B2B transactions, typically happen: a. b. c. d. Only through pre-established Electronic Data Interchange (EDI) protocols. Only through Internet sites. Through Internet, EDI, intranets or extranets. E-mail verified by certified postal delivery. CPA-03654 Explanation Choice "c" is correct. Business to business (B2B) transactions typically occur through any number of different networks including the Internet, private corporate intranets, extranets, or Electronic Data Interchange (EDI) arrangements. 43 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "a" is incorrect. B2B is not required to take place only through a single network such a private Value Added Network (VAN) established to effect Electronic Data Interchange (EDI). Choice "b" is incorrect. B2B is not required to take place only through a single network such as an intranet. Choice "d" is incorrect. Confirmation of business transactions typically occurs online and does not require or generally even use hard copy confirmations mailed through the United States Postal Service. CPA-03658 Type1 M/C 87. CPA-03658 4D.C02 - 9 A-D Corr Ans: B PM#5 B 4-05 Page 54 The communications network typically used to effect Electronic Data Interchange (EDI) between businesses is: a. b. c. d. The Internet. A Value Added Network (VAN). A corporate intranet. An extranet. CPA-03658 Explanation Choice "b" is correct. Electronic Data Interchange (EDI) is usually effected through a Value Added Network (VAN). However it can be effected through the Internet. Choice "a" is incorrect. Electronic Data Interchange (EDI) is usually effected through a Value Added Network (VAN), not the Internet. However, EDI may be effected through the Internet. Choice "c" is incorrect. Electronic Data Interchange (EDI) is usually effected through a Value Added Network (VAN), not a private corporate intranet. Choice "d" is incorrect. Electronic Data Interchange (EDI) is usually effected through a Value Added Network (VAN), not an extranet. CPA-03661 Type1 M/C 88. CPA-03661 4D.C02 - 10 A-D Corr Ans: C PM#6 B 4-05 Page 34 Online transaction processing (OLTP) systems play a strategic role in electronic commerce. One of the key features of OLTP systems is: a. b. c. d. Selection of products from previously distributed catalogues. Postal confirmation of transactions within three days of execution. Immediate real time processing of transactions. Inspection of other consumer purchases as a basis for recommendations. CPA-03661 Explanation Choice "c" is correct. Online transaction processing (OLTP) systems generally require immediate real time processing of transactions including exchange of consideration by the buyer. Choice "a" is incorrect. OLTP does not require use of hard copy catalogues. Available goods are generally displayed online. Choice "b" is incorrect. OLTP generally does not require postal confirmation of transactions. Confirmations are often provided at the time of execution of the transaction. Choice "d" is incorrect. Inspection of other consumer purchases is inappropriate. Typically OLTP provides specific security measures to ensure that the buyer cannot view what others buy and others cannot view what they buy. CPA-03672 Type1 M/C A-D Corr Ans: C PM#8 B 4-05 44 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 89. CPA-03672 4D.C02 - 19 Page 60 After a B2B transaction occurs, the area of management that is concerned with what goods were ordered, when and where the goods were to be delivered, and what the amount paid is: a. b. c. d. The Database Management group. The Management Information System group. The Supply Chain Management group. The Business Information Systems group. CPA-03672 Explanation Choice "c" is correct. Supply Chain Management (SCM) is concerned with four important characteristics for every sale: what, when and where the goods were delivered and how much the goods cost. CPA-03675 Type1 M/C 90. CPA-03675 Au R02 #7 A-D Corr Ans: A PM#9 B 4-05 Page 54 Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce? a. b. c. d. EDI transactions are formatted using standards that are uniform worldwide. EDI transactions need not comply with generally accepted accounting principles. EDI transactions ordinarily are processed without the Internet. EDI transactions are usually recorded without security and privacy concerns. CPA-03675 Explanation Choice "a" is correct. EDI requires that all transactions be submitted in standard (by industry) data format. However, there are at least two sets of standards in different parts of the world. So this question is actually incorrect in that none of the answers are really correct. This choice is just better than the others. Choice "b" is incorrect. Use of EDI does not reduce the need to comply with GAAP in recording transactions. Choice "c" is incorrect. EDI is a computer-to-computer exchange of business data that often involves use of the Internet. Choice "d" is incorrect. The greatest risk regarding the use of EDI is the improper distribution of EDI transactions, so security and privacy concerns are of great importance. CPA-03678 Type1 M/C 91. CPA-03678 Au R02 #18 A-D Corr Ans: A PM#10 B 4-05 Page 54 In building an electronic data interchange (EDI) system, what process is used to determine which elements in the entity's computer system correspond to the standard data elements? a. b. c. d. Mapping. Translation. Encryption. Decoding. CPA-03678 Explanation Choice "a" is correct. Mapping is the process of determining the correspondence between elements in a company's terminology and elements in standard EDI terminology. Once the mapping has been completed, translation software can be developed to convert transactions from one format to the other. Choice "b" is incorrect. Translation is the conversion of data from one format to another, such as from EDI format to an internal company format. Choice "c" is incorrect. Encryption is the encoding of data for security purposes. 45 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "d" is incorrect. Decoding is the process used by the recipient of encoded information, whereby a "key" is used to decipher the message. CPA-03682 Type1 M/C 92. CPA-03682 Au R99 #8 A-D Corr Ans: C PM#11 B 4-05 Page 63 Which of the following is usually a benefit of using electronic funds transfer for international cash transactions? a. b. c. d. Improvement of the audit trail for cash receipts and disbursements. Creation of self-monitoring access controls. Reduction of the frequency of data entry errors. Off-site storage of source documents for cash transactions. CPA-03682 Explanation Choice "c" is correct. Use of electronic funds transfer for any funds transfer reduces the need for manual data entry, thus reducing the occurrence of data entry errors. Choice "a" is incorrect. Use of electronic funds transfer is likely to result in a reduction of the paper audit trail surrounding cash receipts and disbursements. Choice "b" is incorrect. Use of electronic funds transfer creates a need for more stringent access controls. Choice "d" is incorrect. Use of electronic funds transfer does not affect company policy regarding storage of source documents (e.g., an accounts payable invoice) for cash transactions. CPA-03686 Type1 M/C 93. CPA-03686 Au R99 #12 A-D Corr Ans: B PM#12 B 4-05 Page 54 Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? a. When the confidentiality of data is the primary risk, message authentication is the preferred control rather than encryption. b. Encryption performed by physically secure hardware devices is more secure than encryption performed by software. c. Message authentication in EDI systems performs the same function as segregation of duties in other information systems. d. Security at the transaction phase in EDI systems is not necessary because problems at that level will usually be identified by the service provider. CPA-03686 Explanation Choice "b" is correct. Encryption performed by physically secure hardware is more secure than that performed by software because software may be more accessible from remote locations. In addition, because hardware decrypts faster than software, more complex algorithms (which are more difficult to "crack") may be used. Choice "a" is incorrect. If data confidentiality is a primary concern, encryption would be more important than verifying message authenticity. Choice "c" is incorrect. Message authentication in EDI systems ensures that only authorized trading partners are submitting transactions, whereas controls related to the segregation of (many system) duties are designed to prevent any one person from having the ability to both perpetrate and conceal fraudulent activities. CPA-03693 Type1 M/C 94. CPA-03693 Au R98 #9 A-D Corr Ans: C PM#13 B 4-05 Page 54 46 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Which of the following represents an additional cost of transmitting business transactions by means of electronic data interchange (EDI) rather than in a traditional paper environment? a. Redundant data checks are needed to verify that individual EDI transactions are not recorded twice. b. Internal audit work is needed because the potential for random data entry errors is increased. c. Translation software is needed to convert transactions from the entity's internal format to a standard EDI format. d. More supervisory personnel are needed because the amount of data is greater in an EDI system. CPA-03693 Explanation Choice "c" is correct. Translation software is a required component in an EDI environment, and it represents an additional cost not incurred in the traditional paper environment. Choice "a" is incorrect. Redundant data checks to verify that transactions are not recorded twice may be used in an EDI environment (especially if a VAN is used), but they are not specifically required. Choices "b" and "d" are incorrect. In an EDI environment, communication between trading partners is automated. Because the receiving company no longer has to manually input transaction data into its own internal computer system, data entry labor and the potential for errors are both reduced. CPA-03696 Type1 M/C 95. CPA-03696 Au R98 #10 A-D Corr Ans: A PM#14 B 4-05 Page 54 Many entities use the Internet as a network to transmit electronic data interchange (EDI) transactions. An advantage of using the Internet for electronic commerce rather than a traditional value-added network (VAN) is that the Internet: a. b. c. d. Permits EDI transactions to be sent to trading partners as transactions occur. Automatically batches EDI transactions to multiple trading partners. Possesses superior characteristics regarding disaster recovery. Converts EDI transactions to a standard format without translation software. CPA-03696 Explanation Choice "a" is correct. The Internet permits EDI transactions to be sent to trading partners as transactions occur, rather than batching them periodically (as with a VAN). Choice "b" is incorrect. A VAN batches transactions to multiple trading partners, whereas transactions over the Internet are sent to each trading partner as they occur. Choice "c" is incorrect. A VAN is superior to the Internet in terms of disaster recovery because the additional service provided by VANs often includes the archiving of data. Records of EDI transactions may be kept for months or years, which can aid in the disaster recovery process. Choice "d" is incorrect. Regardless of the method of transport used, translation software is still needed in an EDI environment. CPA-03698 Type1 M/C 96. CPA-03698 Au R98 #27 A-D Corr Ans: D PM#15 B 4-05 Page 54 Which of the following characteristics distinguishes electronic data interchange (EDI) from other forms of electronic commerce? a. The cost of sending EDI transactions using a value-added network (VAN) is less than the cost of using the Internet. b. Software maintenance contracts are unnecessary because translation software for EDI transactions need not be updated. c. EDI commerce is ordinarily conducted without establishing legally binding contracts between trading partners. d. EDI transactions are formatted using strict standards that have been agreed to worldwide. 47 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-03698 Explanation Choice "d" is correct. Electronic data interchange (EDI) (intercompany exchange of computer-processible business information) requires strict adherence to a standard data format. Translation software is required to convert internal company data to this format. Choice "a" is incorrect. EDI can be accomplished using direct links between the trading partners, through communication intermediaries (called "service bureaus"), through value added networks (VANs), or over the Internet. Internet-based communication is the least expensive communications method. Choice "b" is incorrect. Translation software is required in order to achieve the specified data format. Like all software, translation software will need to be updated as requirements change in order to follow changing conditions. Choice "c" is incorrect. EDI is always accompanied by contracts, which specify the types of data to be exchanged, the rules governing transaction processing, and data and file security standards. CPA-04800 Type1 M/C A-D Corr Ans: C PM#16 B 4-05 97. CPA-04800 2005 Released Page 57 Which of the following statements is correct concerning the security of messages in an electronic data interchange (EDI) system? a. Removable drives that can be locked up at night provide adequate security when the confidentiality of data is the primary risk. b. Message authentication in EDI systems performs the same function as segregation of duties in other information systems. c. Encryption performed by a physically secure hardware device is more secure than encryption performed by software. d. Security at the transaction phase in EDI systems is not necessary because problems at that level will be identified by the service provider. CPA-04800 Explanation Choice "c" is correct. Encryption performed by a physically secure hardware device is more secure than encryption performed by software. In this question, the hardware is stated to be physically secure. It is possible in a networked environment (implied because of EDI) for software to be compromised in some manner and thus for the encryption to be interfered with if it accomplished by software. Choice "a" is incorrect and has almost got to be a joke. Removable disk drives are not going to help in EDI system security. Choice "b" is incorrect. It says message authentication performs the same function as segregation of duties. All message authentication does is say that the message is received. It really has nothing to do with segregation of duties. Besides, what is segregation of duties "in other information systems?" This choice is just putting good sounding words together; however, the end result is not particularly meaningful. Choice "d" says that the service provider will provide transaction security. That would come as a real surprise to most service providers. EDI service providers are responsible for network security but not for transaction security. CPA-05188 Type1 M/C A-D Corr Ans: C PM#17 B 4-05 98. CPA-05188 Page 62 Detroit Services Corporation provides services to various companies in the automotive industry. Detroit uses a CRM system. Which of the following statements is correct with respect to CRM systems? a. CRM systems provide sales force automation and customer services. b. The objectives of CRM systems are to increase customer satisfaction and customer revenue. 48 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 c. Both statements are correct. d. Neither statement is correct. CPA-05188 Explanation Choice "c" is correct. Both statements are correct. CRM systems provide sales force automation and customer services. CRM systems record and manage customer contacts, manage salespeople, forecast sales and sales targets and goals, manage sales leads and potential sales leads, provide and manage online quotes and product specifications and pricing, and analyze sales data. This statement is correct. The objectives of CRM systems are to increase customer satisfaction and customer revenue. This statement is correct. Choice "d" is incorrect. Both statements are correct. CPA-05260 Type1 M/C A-D Corr Ans: B PM#18 B 4-05 99. CPA-05260 Released 2006 Page 54 A manufacturing company that wanted to be able to place material orders more efficiently most likely would utilize which of the following? a. b. c. d. Electronic check presentment. Electronic data interchange. Automated clearinghouse. Electronic funds transfer. CPA-05260 Explanation Choice "b" is correct. A manufacturing company that wanted to be able to "place" material orders more efficiently would utilize EDI for placing those orders and probably also for other "paperwork" between the company and its vendors. Choice "a" is incorrect. Electronic check presentment, whatever that is, would be used for making payments and would not do anything with regard to the placing of orders. Choice "c" is incorrect. An automated clearinghouse presumably has to do with the automated clearing of checks and other payments. Again, it would be used for making payments and would not do anything with regard to the placing of orders. Choice "d" is incorrect. Electronic funds transfer would again be used for making payments and would not do anything with regard to the placing of orders. CPA-05557 Type1 M/C 100. CPA-05557 A-D Corr Ans: B PM#19 B 4-05 Released 2007 Page 54 Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment? a. b. c. d. Elimination of the need to continuously update antivirus software. Assurance of the thoroughness of transaction data because of standardized controls. Automatic protection of information that has electronically left the entity. Elimination of the need to verify the receipt of goods before making payment. CPA-05557 Explanation Choice "b" is correct. One of the benefits of EDI is that transactions are transmitted in a standardized manner with the same controls at all times because the transmission is done by an application system instead of by a person (unless the application controls are changed in some manner). What the word "thoroughness" might mean is unclear. It might mean that all (as opposed to just some) transactions are 49 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 transmitted or it might mean something else. It's hard to tell, but that does not keep us from answering the question correctly. The other choices are certainly incorrect. Choice "a" is incorrect. EDI does not have anything to do with antivirus software. It certainly does not eliminate the need to update antivirus software continuously; that need is still there. Virus software (actually the virus definitions, not necessarily the software itself) needs to be updated regularly; most antivirus software vendors provide updated virus definitions on at least a weekly basis. Choice "c" is incorrect. EDI has nothing to do with the automatic protection of information that has left the entity, electronically or in any other manner. Once data or information has left the entity, the entity can do nothing more to protect it. Any protection (such as encryption) would have to have been applied to the data or information before that data or information left the entity. Choice "d" is incorrect. EDI does not have anything to do with the need to verify receipt of goods before making payment. Purchased goods should normally be received before payment is made (unless some kind of advance payment is being made). Once goods are received or payment is authorized by another means, the payment can be made, with manually or by EDI, as appropriate. Many of the released IT questions are not some of the best examples of questions we have received (maybe that is one reason why they were released). This question is a perfect example of that kind of problem. The majority of the incorrect choices for a good question should have at least a chance of being correct and thus a chance of being selected by a candidate without the requisite knowledge; in this question, the incorrect choices are not even close and the correct answer can be obtained by a candidate with only the very slightest idea of what EDI is. However, remember that points can be obtained even for poorly-written questions, and points on all questions count the same. CPA-05596 Type1 M/C 101. CPA-05596 A-D Corr Ans: C PM#20 B 4-05 Released 2007 Page 64 Which of the following allows customers to pay for goods or services from a web site while maintaining financial privacy? a. b. c. d. Credit card. Site draft. E-cash. Electronic check. CPA-05596 Explanation Choice "c" is correct. Electronic payment systems are discussed in the B4 Technical Addendum; they are not discussed in the main text. E-cash is currency in an electronic form that moves outside the normal channels of money. It maintains financial privacy just like real cash does. Choice "a" is incorrect. A credit card cannot be used to pay for goods or services while maintaining (complete) financial privacy. While a particular site may be very secure, the mere fact of presenting the credit card does not maintain financial privacy. Choice "b" is incorrect. A "site draft" (which is actually a "sight draft" which means that it can be seen) is a draft (see R6 Commercial Paper); it is a negotiable instrument that is payable on demand. It does not maintain (complete) financial privacy any more than a check does. Choice "d" is incorrect. An electronic check does not maintain financial privacy any more than a paper check does. Supplemental Questions CPA-03720 Type1 M/C 102. CPA-03720 A-D D94 - 1.13 Corr Ans: C PM#1 B 4-99 Page 7 Which one of the following systems best characterizes a decision support system (DSS)? 50 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 a. b. c. d. Transaction processing system (TPS). Database management system (DBMS). Interactive system. Computer-integrated manufacturing system (CIM). CPA-03720 Explanation Choice "c" is correct. Decision support systems are interactive. Choice "a" is incorrect. DSS are not transaction-based. Choice "b" is incorrect. DSS use database management systems as tools, but these are not the main thrusts of a DSS. Choice "d" is incorrect. DSS are for decision-making, not manufacturing. CPA-03723 Type1 M/C 103. CPA-03723 A-D BEC C03 #11 Corr Ans: A PM#2 B 4-99 Page 31 The Internet can be defined as: a. b. c. d. An international network of computers that are all linked together. A network controlled and managed by an international committee. A network controlled and managed by the United States government. An international network of computers used primarily for selling retail goods. CPA-03723 Explanation Choice "a" is correct. The Internet is composed of hundreds of thousands, if not millions, of interconnected business, government, military, and education networks from all around the world that all can communicate with one another. It is a true international network of computers that are linked together. Choice "b" is incorrect. There is no international committee that controls the Internet. Choice "c" is incorrect. The United States government does not control the Internet. Choice "d" is incorrect. The Internet is used for much more than retail purchases; it is used for educational, governmental, and many other types of informational purposes. CPA-03729 Type1 M/C 104. CPA-03729 A-D 4D.C02 - 27 Corr Ans: A PM#3 B 4-99 Page 23 Which of the following statements concerning data mining is(are) correct? I. Data mining is the analysis of data in a data warehouse performed in order to attempt to discover hidden patterns and trends in business. II. Data mining assists managers in making business decisions and strategic planning. III. Although it will take a little longer without a computer, a manager would be able to perform data mining analysis manually. a. b. c. d. I and II. I and III. II and III. I, II, and III. CPA-03729 Explanation Choice "a" is correct. Statements I and II are correct. Statement I: A major use of data warehouse databases is data mining. Data mining is the analysis of data in a data warehouse in order to attempt to discover hidden patterns and trends in historical business activities. 51 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Statement II: Data mining would help mangers understand the changes that are occurring in a business and would also assist in making strategic business decisions in order to attempt to get a competitive advantage in the marketplace. Statement III is a false statement. Data mining is used to sift through inordinate amounts of data, sometimes several terabytes of information. (One terabyte is equal to one trillion bytes or one thousand gigabytes.) Without the use of a computer, a person would never be able to analyze this much data and uncover trends using algorithms and other mathematical and statistical procedures. Choices "b", "c", and "d" are incorrect, per the above explanation. CPA-03731 Type1 M/C 105. CPA-03731 A-D Au Nov 95 #3 Corr Ans: B PM#4 B 4-99 Page 39 Able Co. uses an online sales order processing system to process its sales transactions. Able's sales data are electronically sorted and subjected to edit checks. A direct output of the edit checks most likely would be a: a. b. c. d. Report of all missing sales invoices. File of all rejected sales transactions. Printout of all user code numbers and passwords. List of all voided shipping documents. CPA-03731 Explanation Choice "b" is correct. Edit checks are designed to ensure that invalid inputs are rejected. A list of rejected transactions would be produced to allow the correction and re-submission of such transactions. Choice "a" is incorrect. An order processing system would not be aware of which sales invoices are missing or have been lost. Choice "c" is incorrect. A report containing user code numbers and passwords would not be generated by an edit check. Choice "d" is incorrect. The existence of voided shipping documents would not be something that an edit check on sales transactions would detect. CPA-03733 Type1 M/C 106. CPA-03733 A-D Corr Ans: A PM#5 B 4-99 Au May 93 #16 Page 39 Mill Co. uses a batch processing method to process its sales transactions. Data on Mill's sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances. One of the direct outputs of the creation of this tape most likely would be a: a. b. c. d. Report showing exceptions and control totals. Printout of the updated inventory records. Report showing overdue accounts receivable. Printout of the sales price master file. CPA-03733 Explanation Choice "a" is correct. In a batch processing system, one of the input controls would be a report showing exceptions and a control total for all invoices processed in each batch. Choice "b" is incorrect. There would be no printout of the updated inventory records because the batch has not been processed and the inventory records are not updated when the tape is created. Choice "c" is incorrect. When the tape is created, the batch has not been processed, so sales have not been posted to the accounts receivable ledger. There would be no report showing overdue accounts receivable. 52 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "d" is incorrect. The sales price master file is not a direct output of the tape. CPA-03738 Type1 M/C 107. CPA-03738 A-D Au R99 #9 Corr Ans: A PM#6 B 4-99 Page 54 Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment? a. b. c. d. A compressed business cycle with lower year-end receivables balances. A reduced need for an auditor to test computer controls related to sales and collections transactions. An increased opportunity to apply statistical sampling techniques to account balances. No need to rely on third-party service providers to ensure security. CPA-03738 Explanation Choice "a" is correct. Because EDI speeds transaction processing, the business cycle is generally shortened and year-end receivable balances are reduced. Choice "b" is incorrect. An EDI environment requires greater testing of computer controls. Choice "c" is incorrect. An EDI environment does not affect the ability to apply statistical sampling techniques to account balances. Choice "d" is incorrect. EDI is often implemented through communication intermediaries, requiring reliance on those providers for provision of appropriate security measures. CPA-03741 Type1 M/C 108. CPA-03741 A-D D94 - 1.17 Corr Ans: C PM#7 B 4-99 Page 54 A system that permits suppliers and buyers to have indirect access to portions of each other's databases, including inventory data, to enhance service and deliveries is: a. b. c. d. Electronic mail. Interactive processing. Electronic data interchange. Distributed processing. CPA-03741 Explanation Choice "c" is correct. Electronic data interchange (EDI) permits suppliers and buyers to have indirect access to portions of each other's databases, including inventory data, to enhance service and deliveries. Developed to enhance inventory management, EDI allows the transmission of electronic documents between computer systems in different organizations. Choice "a" is incorrect. Electronic mail allows the transfer, receipt, and storage of "messages" between computer users. Choice "b" is incorrect. Interactive processing allows "end users" to access a database and to "process" data. Choice "d" is incorrect. Distributed processing involves a network of computers located throughout an organization's different facilities to fulfill information processing needs. CPA-04806 Type1 M/C 109. CPA-04806 A-D Corr Ans: D PM#8 B 4-99 2005 Released Page 67 Which of the following activities would most likely detect computer-related fraud? a. b. c. d. Using data encryption. Performing validity checks. Conducting fraud-awareness training. Reviewing the systems-access log. 53 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 CPA-04806 Explanation Choice "d" is correct. The question addresses computer-related fraud. Most of the time, computerrelated fraud has something to do with an unauthorized access to systems and/or data. Of the choices available, review of system access logs is the best choice. System access logs are electronic lists of who has accessed or has attempted to access systems or parts of systems or data or subsets of data. Choice "a" is incorrect. Data encryption might keep intercepted data from being understood, but it will do absolutely nothing to detect fraud. Choice "b" is incorrect. Validity checks might prevent erroneous data from being entered into a system, but they will do absolutely nothing to detect fraud. Choice "c" is incorrect. If fraud-awareness training means training employees on how better to spot fraud, it might have some value; however, even then, choice "d" would be the best choice to answer his question. CPA-04807 Type1 M/C 110. CPA-04807 A-D Corr Ans: D PM#9 B 4-99 2005 Released Page 67 The computer operating system performs scheduling, resource allocation, and data retrieval functions based on a set of instructions provided by the: a. b. c. d. Multiplexer. Peripheral processors. Concentrator. Job control language. CPA-04807 Explanation Choice "d" is correct. Even if we do not know what Job Control Language (JCL) is, we can get the right answer by the process of elimination if we have some kind of idea as to what the other choices are. Multiplexers, peripheral processors, and concentrators all are hardware that something to do with telecommunications. Job Control Language is the "odd man out." Finally, the word "language" implies some kind of software (just like any other programming language), while the other choices sound like hardware. Again, "odd man out." Job Control Language is something associated with IBM mainframes, specifically batch processing applications. Job Control Language, which can be almost as complex as any programming language, is used to "interface" between the jobs that are to be run and the operating system. Jobs normally consist of multiple programs to be run, and the Job Control Language controls the running of the jobs and programs. It also allows the programs to be written somewhat generically, and the Job Control Language makes the translation, for example, from the generic file names used in the programs (INPUTFILE) and the specific files names (ACCOUNTSRECEIVABLEMASTER) and version names that are actually to be used when the job is run. This question is a little weak because it relates to a specific computing environment (i.e., IBM mainframes). Even today’s best "techie" who has never worked in an IBM mainframe environment might not know what Job Control Language is (other computing environments sometimes have the same kind of job control software, but it has a different name). But, even then, it is quite possible to figure out the correct answer by a process of elimination and a little word analysis. You don’t always have to know everything to get the right answer! Choices "a", "b", and "c" are incorrect because these are all hardware that have nothing to do with the computer operating system. CPA-04821 Type1 M/C A-D Corr Ans: A PM#10 B 4-99 54 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 111. CPA-04821 2005 Released Page 67 What is a major disadvantage to using a private key to encrypt data? a. b. c. d. Both sender and receiver must have the private key before this encryption method will work. The private key cannot be broken into fragments and distributed to the receiver. The private key is used by the sender for encryption but not by the receiver for decryption. The private key is used by the receiver for decryption but not by the sender for encryption. CPA-04821 Explanation Choice "a" is correct. The wording of the question is a little suspect because the "using a private key" should be written more clearly as "using private key encryption," which distinguishes it from public key encryption (public key encryption includes the use of private and public keys). Changing the wording of the question is really the only way that the released answer can be correct. In private key encryption, both parties must have the private key, and that is a major disadvantage of private key encryption. If the private key has to be sent, it should be sent separately from the message; otherwise, nothing much has been accomplished. Choice "b" is incorrect. The private key in private key encryption has to be transmitted to the receiver in some manner. Breaking the private key into fragments is a way to attempt to keep the private key as secure as possible. Choice "c" is incorrect. In private key encryption, both the sender and the receiver have to have the private key. Choice "d" is incorrect. In private key encryption, both the sender and the receiver have to have the private key. CPA-05324 Type1 M/C 112. CPA-05324 A-D Corr Ans: A PM#11 B 4-99 Released 2006 Page 67 An organization relied heavily on e-commerce for its transactions. Evidence of the organization's security awareness manual would be an example of which of the following types of controls? a. b. c. d. Preventative. Detective. Corrective. Compliance. CPA-05324 Explanation Note: It is very much unclear what the word "manual" means in this question. For that reason, the question will be answered ignoring the word. Possibly it means that the organization's security awareness is documented in some manual. Also, "preventative" controls in Choice "a" should probably be "preventive" controls. Even Google did not like the word "preventative." We did, however, use the word "preventative" in the Glossary, so we will stick with that spelling. Choice "a" is correct. Preventative controls are controls that are designed to prevent potential problems from occurring. An organization that relied heavily on e-commerce would probably want as many preventative controls as possible because it might be difficult or impossible to correct errors after the fact. This question is more an Audit question than an IT question, even though preventative controls, detective controls, and corrective controls are all defined in the Glossary of the BEC text. Choice "b" is incorrect. An organization that relied heavily on e-commerce would probably want as many preventative controls as possible because it might be difficult or impossible to correct errors after the fact. Of course, detective controls should not be ignored because it is difficult to prevent all errors. Choice "c" is incorrect. An organization that relied heavily on e-commerce would probably want as many preventative controls as possible because it might be difficult or impossible to correct errors after the fact. Of course, corrective controls should not be ignored, because, if errors are detected, they must be corrected properly. 55 © 2009 DeVry/Becker Educational Development Corp. All rights reserved. Becker CPA Review, PassMaster Questions Lecture: Business 4 Choice "d" is incorrect. Compliance controls appears to be a made-up term. 56 © 2009 DeVry/Becker Educational Development Corp. All rights reserved.