03 Sep ACC 564 FINAL EXAM PART 1 NEW SPRING…GUARANTEED A+ ANSWERS! GOOD LUCK
Question 1 .4 out of 4 points
An accounting information system (AIS) processes ________ to provide users with ________.
A) data; information
B) data; transactions
C) information; data
D) data; benefits
Question 2 .4 out of 4 points
Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process?
A) Hire and train employees
B) Acquire inventory
C) Sell merchandise
D) Collect payment from customers
Question 3 .4 out of 4 points
Which of the following is a primary activity in the value chain?
A) infrastructure
B) technology
C) purchasing
D) marketing and sales
Question 4 .4 out of 4 points
A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the
A) organizational culture.
B) customer base.
C) external financial statement users.
D) production activity.
Question 5 .4 out of 4 points
A frantic Stro Frinzel called the home office from Des Moines. “You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can’t get through to the company Web site to verify delivery!” “Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later.” Which of the following characteristics of useful information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Question 6 .4 out of 4 points
The coding technique most likely used for sales orders is called a
A) group code.
B) block code.
C) data code.
D) sequence code.
Question 7 .4 out of 4 points
The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of
A) internal financial information.
B) internal nonfinancial information.
C) external financial information.
D) external nonfinancial information.
Question 8 .4 out of 4 points
A specialized journal
A) is used to record infrequent or non-routine transactions.
B) simplifies the process of recording large numbers of repetitive transactions.
C) records all detailed data for any general ledger account that has individual sub-accounts.
D) contains summary-level data for every account of the organization.
Question 9 .4 out of 4 points
Data must be collected about three facets of each business activity. What are they?
A) the business activity, the resources it affects, the people who participate
B) the business activity, the transactions it creates, the impact on the financial statements
C) the inputs, outputs and processes used
D) who is involved, what was sold, how much was paid
Question 10 .4 out of 4 points
A specialized journal would be most likely to be used to enter
A) sales transactions.
B) monthly depreciation adjustments.
C) annual closing entries.
D) stock issuance transactions.
Question 11 .4 out of 4 points
The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system?
A) rectangle
B) circle
C) arrow up and right
D) parallel horizontal lines
Question 12 .4 out of 4 points
A flowchart that depicts the relationships among the input, processing, and output of an AIS is
A) an internal control flowchart.
B) a document flowchart.
C) a system flowchart.
D) a program flowchart.
Question 13 .4 out of 4 points
In a data flow diagram of the customer payment process, “Customer payment” will appear above or in
A) a square.
B) a circle.
C) two horizontal lines.
D) none of the above
Question 14 .4 out of 4 points
In general, a data destination will be shown by
A) an arrow pointing away.
B) an arrow pointing in.
C) arrows pointing both ways.
D) no arrows, only two horizontal lines.
Question 15 .4 out of 4 points
In preparing a DFD, when data are transformed through a process, the symbol used should be
A) a circle.
B) an arrow.
C) a square.
D) two horizontal lines.
Question 16 .4 out of 4 points
When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language?
A) Data Query Language
B) Data Manipulation Language
C) Data Report Language
D) Data Definition Language
Question 17 .4 out of 4 points
The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the
A) update anomaly.
B) insert anomaly.
C) inconsistency anomaly.
D) delete anomaly.
Question 18 .4 out of 4 points
The schema that provides an organization-wide view of the entire database is known as the
A) external-level schema.
B) internal-level schema.
C) conceptual-level schema.
D) logical view of the database.
Question 19 .4 out of 4 points
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the
A) entity integrity rule.
B) referential integrity rule.
C) rule of keys.
D) foreign key rule.
Question 20 .4 out of 4 points
In a relational database, requiring that every record in a table have a unique identifier is called the
A) entity integrity rule.
B) referential integrity rule.
C) unique primary key rule.
D) foreign key rule.
Question 21 .4 out of 4 points
Which of the following is an opportunity that could contribute to employee fraud?
A) an employee’s spouse loses their job
B) an employee suddenly acquires lots of credit cards
C) an employee is upset that he was passed over for a promotion
D) close association with suppliers or customers
Question 22 .4 out of 4 points
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
A) human errors and omissions
B) physical threats such as natural disasters
C) dishonest employees
D) fraud and embezzlement
Question 23 .4 out of 4 points
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
A) lapping.
B) misappropriation of assets.
C) kiting.
D) concealment.
Question 24 .4 out of 4 points
Most frauds are detected by
A) external auditors.
B) internal auditors.
C) accident.
D) hotline tip.
Question 25 .4 out of 4 points
The most efficient way to conceal asset misappropriation is to
A) write-off a customer receivable as bad debt.
B) alter monthly bank statements before reconciliation.
C) alter monthly physical inventory counts to reconcile to perpetual inventory records.
D) record phony payments to vendors.
Question 26 .4 out of 4 points
A fraud technique that slices off tiny amounts from many projects is called the ________ technique.
A) Trojan horse
B) round down
C) salami
D) trap door
Question 27 .4 out of 4 points
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Question 28 .4 out of 4 points
A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called
A) superzapping.
B) data diddling.
C) using a trap door.
D) piggybacking.
Question 29 .4 out of 4 points
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
A) hackers.
B) crackers.
C) phreakers.
D) jerks.
Question 30 .4 out of 4 points
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
A) worm; virus
B) Trojan horse; worm
C) worm; Trojan horse
D) virus; worm
Question 31 .4 out of 4 points
________ controls prevent, detect and correct transaction errors and fraud.
A) Application
B) Detective
C) General
D) Preventive
Question 32 .4 out of 4 points
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.