SlideShare a Scribd company logo
1 of 42
Download to read offline
ACC 340 Final Exam Guide New
For more course tutorials visit
www.newtonhelp.com
1. The essential steps in performing a systems study are (in order of
occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production,
implementation
d) Planning, analysis, design, implementation, and follow up
2. Which of the following is intended to solve the problem that
financial data used in one application is not easily transferable to other
applications?
a) XMP
b) ERP
c) XBRL
d) XMLP
3. Information systems auditors are:
a) Auditors who are concerned with analyzing risks associated with
computerized information systems
b) Individuals who often work closely with financial auditors
c) Auditors who have a lot of technical expertise related to
information technology
d) all of the above
4. Which of the following is not an ability of client/server
computing?
a) Alter data stored elsewhere on the network
b) Process a transaction that may affect data stored on both client
and server computers
c) Query or manipulate the warehoused data on the server
d) Increased networking capabilities between different file formats
on multiple systems
5. Software that enables businesses and government agencies to
transmit and manipulate financial data on an organization-wide basis
best describes:
a. Communication software
b. CAD software
c. Enterprise resource planning (ERP) software
d. Programming software
6. All of the following are programming languages except:
a. Java
b. HTML
c. C++
d. COBOL
e. ERP
7. Data flow diagrams:
a) Accomplish the same purpose as system flowcharts
b) Are different from system flowcharts since they focus on a
logical view of the information system
c) Are useless for planning a new system
d) Are never used in analyzing an existing system
8. All of the following are controls for end-user computing except:
a) Formally evaluate large projects
b) Formalize documentation standards
c) Limit the number of employees authorized to create end-user
applications
d) all of the above are important controls
9. The textbook identified seven reasons why documentation of an
AIS is important. For which of the following reasons would the user
guides, procedure manuals and operating instructions be most
important?
a) Depicting how the system works
b) Training users
c) Designing new systems
d) Standardizing communications with others
10. Business organizations are recognizing the value of sales data
and are purchasing software solutions to gather, maintain, and use these
data to provide better service and promote customer loyalty. These
software solutions are called:
a) Customer relations data solutions
b) Customer relationship management solutions
c) Sales data management solutions
d) none of the above
11. Which of the following statements best describes business
process outsourcing?
a) A company focuses on its core business processes and contracts
with another firm to do the other processes
b) Companies frequently outsource core business processes
c) Due to networked enterprises and advanced technology, more
employees may work from their homes or alternate locations
d) Initially, companies engaged in business process outsourcing to
offer employees more opportunities to travel and more career choices for
advancement
12. Networked enterprises and globalization have enabled a new
business model called “business-without-boundaries.” Which of the
following statements describes this business model?
a) Companies no longer have all of their employees in one location
b) It is called offshoring and companies contract with firms in other
countries to do such business processes as human resources, payroll, and
accounting
c) Companies are under a great deal of scrutiny to manage costs
and generate revenue so they contract with foreign firms to do various
business processes at a lower cost to the company
d) all of the above statements describe this model
13. Which of the following is not a concern of the financing process?
a) Effective cash management
b) Optimizing an organization’s cost of capital
c) Minimizing an organization’s borrowings
d) Projecting cash flows
14. Business process reengineering efforts sometimes fail because:
a. Management gets too involved in the process
b. Management is too optimistic regarding its expectations from its
implementation
c. Management support can never overcome employee resistance
d. Employees will never accept change
15. Which of the following technologies are now used in conjunction
with automated production process systems to increase efficiencies?
a) Radio frequency technology
b) Bar code scanners
c) RF IDs and advanced electronic tags
d) all of the above
e) none of the above
16. According to the textbook, which of these statements is most
accurate?
a) Most computer abuse is performed as retaliation against
employers
b) Very little computer crime is committed for personal gain
c) Some computer abuse is performed simply to meet a challenge
d) We catch most computer abusers with good accounting controls
17.Which of the following is probably the primary reason accountants
should be concerned about computer crime and abuse?
a) They might lose their job if they don’t detect computer crime or
abuse in their organization
b) They might lose their professional credibility and license if
computer crime or abuse continues for a long time in their organization
and they do not detect it
c) They are responsible for designing, implementing, and
monitoring the control procedures for AISs
d) none of the above
18.One of the major crimes identified by the Computer Fraud and Abuse
Act of 1986 is intent to illegally obtain information or tangible property
through the use of computers. Which of the following methods might
accomplish this type of crime if the perpetrator can change data before,
during, or after they are entered into a computer system?
a) Salami technique
b) Data diddling
c) Shoulder surfing
d) Trojan horse program
19.Regarding a company's audit trail, which of the following statements
is true?
a) Because of the complexities involved in establishing an audit
trail, a good audit trail normally makes it more difficult for an individual
to follow the flow of a company's business transactions through the
company's information system
b) In actuality, the audit trail established within a company's
information system is an unimportant element of the company's internal
control system
c) When a company's audit trail becomes more difficult to follow,
this causes an increase in the risk of errors or irregularities taking place
in the processing of accounting transactions and not being detected
d) A company's policies and procedures manual should not be part
of its audit trail since confidential information is included within this
manual
20.Which of the following statements is true regarding timely
performance reports?
a. In many companies, these reports are the major means of
providing information to management concerning the actual operations
of the companies’ internal control systems
b. These reports should only include monetary data
c. Since these reports fail to provide feedback to management on
the operations of previously implemented internal control procedures,
other techniques are needed to provide this feedback to managers
d. The complexity that a computer introduces into a company's
information system will typically prevent the preparation of timely
performance reports for the company's management
21. _________________ describes the policies, plans, and
procedures implemented by a firm to protect its assets.
a) Internal control
b) SAS No. 94
c) SOX, Section 404
d) Enterprise risk management
22. General controls within IT environments that affect personnel
include:
a) Use of computer accounts
b) Separation of duties
c) Informal knowledge of employees
d) all of the above affect personnel
23. Which of the following best describes a fundamental control
weakness often associated with automated data processing systems?
a. Automated¬ data processing equipment is more subject to
systems error than manual processing is subject to human error
b. Automated data processing equipment processes and records
similar transactions in a similar manner
c. Automated data processing procedures for detection of invalid
and unusual transactions are less effective than manual control
procedures
d. Functions that would normally be separated in a manual system
are combined in an automated data processing system
24. The textbook identifies a number of issues that should be considered
when developing a security policy. One of the issues is “identify
threats”. Which of the following is not an example of this issue?
a) What assets need to be protected
b) What are the sources of potential security problems
c) External threats are viruses, worms, retaliations from former
employees
d) Internal threats are misuse of assets by employees and
embezzlement
25 Which of these is not a phase in the life cycle of an information
system?
a) Planning
b) Analysis
c) Control
d) Implementation
26. A poorly-planned information system can result in:
a) Employee resistance and even sabotage
b) Inflexible systems that are hard to maintain or modify
c) Systems that solve the wrong problems
d) all of these
27. Which of the following is not a general objective in the design of
an information system?
a) A system should provide information which is timely and
relevant for decision making by management and operating personnel
b) The output of a system should be highly accurate
c) A system should have sufficient capacity to accommodate levels
of normal activity; any additional capacity proves too costly in the long
run
d) A system should be as simple as permitted so that its structure
and operation can be easily understood and its procedures easily
accomplished
e) A system should be flexible to accommodate changes of a
reasonable magnitude when required
28. A computerized AIS is harder to audit than a manual system for
all of the following reasons except:
a) The file information is not human readable
b) The volume of transaction records and master file records is
usually much larger in computerized systems than in manual systems
c) An audit trail does not exist in a computerized AIS
d) Computerized systems often use remote real-time data
processing, thus complicating the tracing of transaction records to their
sources
29. Which of the following is not one of the groups of SOX compliance
requirements?
a) requirements to use an IT auditor to evaluate controls
b) regulations governing executive reporting and conduct
c) rules about financial statement reporting
d) audit committee/corporate governance requirements
30. Three common techniques auditors use to test computer programs
are:
a) Test data, integrated test facilities, and parallel simulation
b) Test data, edit checks, and integrated test facilities
c) Test data, program change control, and parallel simulation
d) Program change control, edit checks, and parallel simulation
31. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
32. The term key in the context of data encryption refers to:
a) A physical key similar to a house key
b) A logical key similar to the primary key of a data file
c) A mathematical function used for encryption purposes
d) A computer function key that can be found on keyboards
33. All of the following are benefits of XBRL except:
a) Companies can file financial information in one format, avoiding
the errors that may come from reentering data multiple times
b) The SEC accepts XBRL-format for electronic filing of financial
statement reports
c) XBRL permits the automatic and reliable exchange of financial
information across all software formats and technologies, including the
Internet
d) all of the above are benefits of XBRL
e) none of the above are benefits of XBRL
34. All of these are reasons why databases are important to AISs
except:
a) AIS databases store valuable information
b) Many AISs are large and therefore potentially unwieldy
c) The databases of some organizations are very complex
d) The hard disk space used to store AIS databases is comparatively
expensive
e) all of these are reasons why databases are important to AISs
35. A major advantage of relational databases is:
a) All records are stored together
b) No pointers are used
c) An expandable index is used
d) It closely resembles a flat file
36. In recent years many businesses have formed a common
information source within their business organization called a database.
One of the advantages of building databases is the simultaneous
updating of files with common data elements. Another major advantage
of the database concept is that:
a) Database systems can be used in microcomputers as well as on
large computers
b) Database systems are simple to install and maintain
c) Database systems are generally less expensive than separate file
maintenance systems
d) Less duplication of data occurs with a database system
e) Fewer skilled people are required to run a database system than
any other system
37. The process of data normalization refers to:
a) Eliminating data errors and other problems from “normal data”
b) Scaling data to values between zero and one
c) Storing data in normal storage media such as hard disks
d) none of these
38. Database management systems are important to accountants because:
a) They automate file storage tasks and enable managers to
generate worthwhile financial reports
b) They eliminate data redundancy
c) They are unique data structures which accountants have never
used before
d) They are easy to develop and therefore save money
e) They are energy efficient
39. Which of these is true about finding data in multimedia
databases?
a) It is not possible to search them because graphics have no text
keys for searching
b) It is not possible to search them because audio objects have no
text keys for searching
c) It is possible to search for items in them because such
characteristics as “speaker” or “subject” can be used as search
parameters
d) It is possible to search for items in them if the name of the
embedded graphics or audio file is also known
===============================================
ACC 340 Week 1 Connect Knowledge Check
For more course tutorials visit
www.newtonhelp.com
1.
The Certified Information Technology Professional is the position
created by the AICPA to recognize CPAs who have the ability to
provide skilled professional services on Information Technology.
True
False
2.
The correct order of effects in the value chain are:
Inbound Logistics → Operations → Service
Inbound Logistics → Outbound Logistics → Marketing & Sales
Inbound Logistics → Operations → Outbound Logistics
Inbound Logistics → Operations → Shipping
3.
Which designation would most appropriate for those professionals
possessing an IT audit, control and security skills?
Certified Internal Auditor (CIA)
Certified Information Systems Auditors (CISA)
Certified Information Technology Professional (CITP)
Certified Public Accountant (CPA)
4.
Business Process Modeling Notation (BPMN) activity diagrams depict
activities as circles.
True
False
5.
Obligatory business rules state what should not occur.
True
False
6.
Which of the following is not a Stewardship and Reporting role of the
Accounting/Finance Function in Business?
Tax returns
Regulatory compliance
Statutory reporting
Human Resource management
7.
Many hospitals and doctor's offices are beginning to digitize the medical
records of their patients. This is an example of the ____________
strategic role.
Informate - up
Automate
Transform
Informate - down
8.
Which of the following best describes a business model?
A simple, abstract representation of a business process or processes.
A sequence of business activities.
An evaluation of potential business process improvements.
None of the above.
9.
Which of the following is the best description of an association?
The relationship between two classes
The lines in a UML Class diagram
A group of classes
The number of times one class is related to another
10.
Which of the following best describes the purpose of a gateway in a
Business Process Modeling Notation (BPMN) activity diagram?
Controls branching and merging.
Shows where the work takes place.
Describes the sequence of workflow.
Affects the flow of the business process.
===============================================
ACC 340 Week 1 Discussion Question 1
For more course tutorials visit
www.newtonhelp.com
Why do some organizations continue to use both manual and
computerized accounting information systems?e business process.
===============================================
ACC 340 Week 1 Textbook Assignment Problem 6 Ch. 1
For more course tutorials visit
www.newtonhelp.com
Write a response of no more than 1,050 words to Problem 6 from Ch. 1,
"Accounting Information Systems and Firm Value" of Accounting
Information Systems.
Click the Assignment Files tab to submit your assignment.
Using the accompanying explanations of each IT strategic role, suggest
the appropriate IT strategic role (automate, informate or transform) for
the following types of IT investments. Depending on your interpretation,
it is possible that some of the IT investments could include two IT
strategic roles.
a.Digital health records
b.Google Maps that recommend hotels and restaurants along a trip path
25
c.Customer relationship management software
d.Supply chain management software
e.Enterprise systems
f.Airline flight reservations systems
g.PayPal (www.paypal.com)
h.Amazon.com product recommendation on your homepage
i.eBay
j.Course and teacher evaluations conducted online for the first time
(instead of on paper)
===============================================
ACC 340 Week 2 Connect Knowledge Check
For more course tutorials visit
www.newtonhelp.com
1.
Control Objectives for Information and related Technology's (CobIT)
guidance is guided by a structure that corresponds to the SDLC, namely:
Plan and Organize, Acquire and Implement, Deliver and Support and
Monitor and Evaluate.
True
False
2.
While hierarchical and network data models require relationships to be
formed at the database creation, relational data models can be made up
as needed.
True
False
3.
The project sponsor is generally the same person as the project
manager.
True
False
4.
The 100% Rule is a rule requiring 100% planning of all external tasks.
True
False
5.
The analysis phase of the SDLC involves a complete, detailed analysis
of the systems needs of the end user.
True
False
6.
To convert a conceptual model with a maximum Multiplicities
relationship of "many to many" into relationship database tables, one
must
Many-to-many relationship cannot be represented in Access.
Create a relationship table to handle the many-to-many relationship.
Create a relation with no attributes of its own.
Create a foreign key in one of the tables to link the two tables.
7.
The Project Manager is the lead member of the project team that is
responsible for the project.
True
False
8.
The critical path in a PERT chart represents:
The most important tasks of the whole project.
The longest path of tasks needed for project completion.
The tasks that must be completed without errors.
The path of processes that is critical for system adoption.
9.
The triple constraint of project management includes the constraint of:
Adoption
Usability
Technical issues
Time
10.
In Access, users can edit database information in reports.
True
false
===============================================
ACC 340 Week 2 Discussion Question 1
For more course tutorials visit
www.newtonhelp.com
What are some of the hardware components of your PC at work? How
are they different from the components of your PC at home?
===============================================
ACC 340 Week 2 Discussion Question 2
For more course tutorials visit
www.newtonhelp.com
What are the benefits and limitations of the network being used at your
organization?
===============================================
ACC 340 Week 2 Enterprise Systems Paper
For more course tutorials visit
www.newtonhelp.com
Prepare a 700- to 1,050-word paper to include the following:
Describe the various types of enterprise wide accounting systems used in
organizations.
Explain how you might use the information system development process
to implement a new system for your organization.
Discuss the steps involved in the development process.
Include a summary of the advantages and disadvantages of the different
types of databases that are used in accounting systems.
Click the Assignment Files tab to submit your assignment.
===============================================
ACC 340 Week 2 Team Assignment Business Process
For more course tutorials visit
www.newtonhelp.com
Select a company that you are familiar with to use as the basis for your
assignment.
Select a business activity in your selected company. For example, the
sales activity, the accounting activity, the manufacturing activity, the
hiring activity, etc.
Prepare a 10- to 12-slide presentation to include the following:
Speaker notes.
A description of the business activity process.
A Business Process Modeling Notation (BPMN) activity model for the
selected business activity.
An explanation of how the use of technology will impact this business
activity and the accounting for this activity.
Click the Assignment Files tab to submit.
===============================================
ACC 340 Week 3 Discussion Question 1
For more course tutorials visit
www.newtonhelp.com
What are the advantages of a relational approach to database design?
What are the drawbacks?
===============================================
ACC 340 Week 3 Discussion Question 2
For more course tutorials visit
www.newtonhelp.com
Does your firm use a DBMS? Can you tell us about it?
===============================================
ACC 340 Week 3 Team Database and Reports
For more course tutorials visit
www.newtonhelp.com
Use your selected business activity from Week 2.
Design at least two relational database tables.
Identify the primary keys and foreign keys for your tables.
Determine the reports you would create to assist management evaluate
and monitor the business process.
Identify the relationships (using keys) that are needed to create these
reports.
Click the Assignment Files tab to submit your assignment.
Note. Grades are awarded based upon individual contributions to the
Learning Team assignment. Each Learning Team member receives a
grade based upon his/her contributions to the team assignment. Not all
students may receive the same grade for the team assignment.
===============================================
ACC 340 Week 4 Connect Knowledge Check
For more course tutorials visit
www.newtonhelp.com
1.
Investments in business analytics systems support the balanced
scorecard management process during the Link to Operations step.
True
False
2.
The process of using sophisticated statistical techniques to extract and
analyze data from large databases to discern patterns and trends that
were not previously known is called:
Data Warehouse
Business Intelligence
Data Mining
Data Mart
3.
Which of the following is not a value proposition characteristic
expected to influence customer value?
Product attributes
Image
Relationship
Innovation
4.
Since both are regulators, the SEC and the IRS will likely have similar
XBRL style sheets for the various XBRL filings.
True
False
5.
XBRL GL (also known as XBRL Global Ledger Taxonomy) serves as a
means to facilitate efficient communication within a firm.
True
False
6.
Network IT changes the way that work if performed and decisions are
made.
True
False
7.
Which of the following is not a step in the balanced scorecard
management process?
Adapt
Invest
Monitor
Translate
8.
In February 2009, the _____________ passed the rule requiring all
large domestic firms to begin formatting their financial statements using
XBRL.
Financial Accounting Standards Board
American Institute of Certified Public Accountants
International Accounting Standards Board
Securities and Exchange Commission
9.
XBRL assurance is generally expected to include:
The most current, standardized XBRL taxonomy is used.
The underlying financial and nonfinancial data that is used in XBRL
tagging is reliable.
The XBRL tagging is accurate and complete.
The reports include all relevant financial and nonfinancial information.
10.
Which of the following is the best description of the Link to Operations
step in the balanced scorecard management process?
The company examines the competitive environment.
The company establishes objectives, measures, targets, and initiatives.
The company prepares operating budgets and prioritizes business
process improvements.
The company evaluates the effectiveness of its strategy.
===============================================
ACC 340 Week 4 Discussion Question 1
For more course tutorials visit
www.newtonhelp.com
What are the steps in the SDLC? Which is most important? What are the
ramifications of skipping one of these steps?
===============================================
ACC 340 Week 4 Discussion Question 2
For more course tutorials visit
www.newtonhelp.com
What is your personal involvement in determining IS requirements?
===============================================
ACC 340 Week 4 Textbook Assignment Ch 13 Problem 1 and 2
For more course tutorials visit
www.newtonhelp.com
Write a response of no more than 1,050 words to Problems 1 and 2 from
Ch. 13, "The Balanced Scorecard and Business Value of Information
Technology" on pp. 272 of Accounting Information Systems.
Click the Assignment Files tab to submit your assignment.
1. Select a prominent public company, such as Apple, Google,
or Microsoft. Obtain recent annual reports and news articles about the
company. Using that information, develop a strategy map that describes
the company’s performance. Start by defining its value proposition, and
then identifying key business processes that deliver that value
proposition.
2. Use the company that you selected for Problem 1. Identify
examples of its learning and growth efforts and explain how those might
affect its business process performance.
===============================================
ACC 340 Week 5 Computer Fraud Paper
For more course tutorials visit
www.newtonhelp.com
Prepare a 700- to 1,050-word article summary about a recent data breach
or computer fraud at an organization to include the following:
Describe the circumstances involved and the results of the event.
Explain how the data breach occurred and what could have been done to
prevent the breach/fraud from occurring.
Discuss what the organization has done or is doing to prevent the
breach/fraud from occurring in the future.
Discuss the impact of the breach/fraud on the organization.
Discuss whether you believe that most incidents of data breaches and
fraud are reported to the public. Why or why not?
Click the Assignment Files tab to submit your assignment.
===============================================
ACC 340 Week 5 Discussion Question 1
For more course tutorials visit
www.newtonhelp.com
What is the difference between a general control and an application
control?
===============================================
ACC 340 Week 5 Discussion Question 2
For more course tutorials visit
www.newtonhelp.com
What internal controls can be implemented using information systems to
safeguard your organization’s electronic assets?
===============================================
ACC 340 Week 5 Individual Assignment Final Exam
For more course tutorials visit
www.newtonhelp.com
Multiple-Choice Questions
1. The process by which a financial transaction is recorded so that its
flow through the system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail
2. Justifying expenditures for new technologies is especially difficult
because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital
budgeting problem
3. The essential steps in performing a systems study are (in order of
occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow up
4. What is the first step to be performed by most organizations in their
accounting cycles?
a) Recording business transactions in a journal
b) Preparing a trial balance
c) Recording closing entries in a journal
d) Preparing transaction source documents
e) none of the above
5. Which systems study step is normally performed first?
a) Design
b) Initial operation
c) Follow up
d) Analysis
e) none of the above
6. The purpose of a company firewall is to:
a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above
7. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
8. An advantage of an extranet is that:
a) It can disseminate information corporate wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in
them
d) all of the above
9. Another name for an Internet domain address is its:
a) URL
b) ISP
c) email address
d) IETF
10. Business process reengineering efforts sometimes fail
because:
a) Management gets too involved in the process
b) Management is too optimistic regarding its expectations from
its implementation
c) Management support can never overcome employee
resistance
d) Employees will never accept change
11. The sales process begins with:
a) Placing an order with a vendor
b) A customer order for goods or services
c) Production of goods or services
d) Delivery of goods or services
12. The primary objective in processing revenues is to:
a) Sell as many goods as possible
b) Achieve timely and efficient cash collection
c) Maximize an organization’s sales orders
d) Only sell goods to customers who can pay their bills
13. An important input to the sales process is:
a) A customer sales order
b) The cash forecast
c) Aged accounts receivable information
d) A receiving report
14. Which of the following is not an example of a source document?
a) Receiving report
b) Purchase order
c) Sales order
d) Aging report
15. Inputs to transaction processing systems:
a) Are always in hard copy
b) Are best when input in a graphical format
c) May be in an electronic format when an EDI system is used
d) May never be audio
16.Integrated accounting software programs generally include all of the
following, except:
a) Graphic reporting capabilities
b) Internet connectivity
c) One standardized chart of accounts
d) The ability to handle multiple companies
17. Enterprise-wide AISs:
a) Almost never pay for themselves
b) Do not include many more features than middle-range accounting
software packages
c) Are seldom used by multinational organizations
d) Integrate an organization’s financial functions with its other
functional areas
18. Training and change management activities:
a) Take place just before the go live stage of implementation
b) Are most effective when conducted throughout design, go live, and
post-implementation follow-up
c) Include technical training only
d) Do not include the design of user interfaces
19. Which of the following software packages is not an example of a
middle-range AIS?
a) Great Plains Dynamics
b) MAS 90
c) SAP R/3
d) Solomon
20. Many organizations purchased new AISs during the 1990’s:
a) Because of the need for Year 2000 compliance
b) Because they wanted Internet connectivity
c) In order to take advantage of opportunities for reengineering
d) all of the above
===============================================

More Related Content

What's hot

A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...Marcirio Chaves
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quizrhettwhitee
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quizolivergeorg
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...theijes
 
Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)Mannilou Pascua
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Sreekanth Narendran
 
Modern Systems Analysis and Design 6th Edition Hoffer Test Bank
Modern Systems Analysis and Design 6th Edition Hoffer Test BankModern Systems Analysis and Design 6th Edition Hoffer Test Bank
Modern Systems Analysis and Design 6th Edition Hoffer Test BankLivingstonne
 

What's hot (11)

A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...A Framework for Dead stock Management System for in-house computer engineerin...
A Framework for Dead stock Management System for in-house computer engineerin...
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Modern Systems Analysis and Design 6th Edition Hoffer Test Bank
Modern Systems Analysis and Design 6th Edition Hoffer Test BankModern Systems Analysis and Design 6th Edition Hoffer Test Bank
Modern Systems Analysis and Design 6th Edition Hoffer Test Bank
 

Similar to ACC 340 Expect Success/newtonhelp.com

Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizsarahlazeto
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizLillieDickey
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizSarajacobe
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizsweetsour2017
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizEmmaJack2018
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quizlizabonilla
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.combeautifuljasmine
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quizMaryLouis2018
 
1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docxfredellsberry
 
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxmydrynan
 
Chapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docxChapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docxSamNguyn21
 

Similar to ACC 340 Expect Success/newtonhelp.com (20)

Sample
SampleSample
Sample
 
Test
TestTest
Test
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.com
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx
 
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
 
Test
TestTest
Test
 
Chapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docxChapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docx
 

Recently uploaded

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
CARNAVAL COM MAGIA E EUFORIA _
CARNAVAL COM MAGIA E EUFORIA            _CARNAVAL COM MAGIA E EUFORIA            _
CARNAVAL COM MAGIA E EUFORIA _
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 

ACC 340 Expect Success/newtonhelp.com

  • 1. ACC 340 Final Exam Guide New For more course tutorials visit www.newtonhelp.com 1. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow up 2. Which of the following is intended to solve the problem that financial data used in one application is not easily transferable to other applications? a) XMP b) ERP c) XBRL d) XMLP
  • 2. 3. Information systems auditors are: a) Auditors who are concerned with analyzing risks associated with computerized information systems b) Individuals who often work closely with financial auditors c) Auditors who have a lot of technical expertise related to information technology d) all of the above 4. Which of the following is not an ability of client/server computing? a) Alter data stored elsewhere on the network b) Process a transaction that may affect data stored on both client and server computers c) Query or manipulate the warehoused data on the server d) Increased networking capabilities between different file formats on multiple systems 5. Software that enables businesses and government agencies to transmit and manipulate financial data on an organization-wide basis best describes: a. Communication software b. CAD software
  • 3. c. Enterprise resource planning (ERP) software d. Programming software 6. All of the following are programming languages except: a. Java b. HTML c. C++ d. COBOL e. ERP 7. Data flow diagrams: a) Accomplish the same purpose as system flowcharts b) Are different from system flowcharts since they focus on a logical view of the information system c) Are useless for planning a new system d) Are never used in analyzing an existing system 8. All of the following are controls for end-user computing except: a) Formally evaluate large projects b) Formalize documentation standards c) Limit the number of employees authorized to create end-user applications d) all of the above are important controls
  • 4. 9. The textbook identified seven reasons why documentation of an AIS is important. For which of the following reasons would the user guides, procedure manuals and operating instructions be most important? a) Depicting how the system works b) Training users c) Designing new systems d) Standardizing communications with others 10. Business organizations are recognizing the value of sales data and are purchasing software solutions to gather, maintain, and use these data to provide better service and promote customer loyalty. These software solutions are called: a) Customer relations data solutions b) Customer relationship management solutions c) Sales data management solutions d) none of the above 11. Which of the following statements best describes business process outsourcing? a) A company focuses on its core business processes and contracts with another firm to do the other processes
  • 5. b) Companies frequently outsource core business processes c) Due to networked enterprises and advanced technology, more employees may work from their homes or alternate locations d) Initially, companies engaged in business process outsourcing to offer employees more opportunities to travel and more career choices for advancement 12. Networked enterprises and globalization have enabled a new business model called “business-without-boundaries.” Which of the following statements describes this business model? a) Companies no longer have all of their employees in one location b) It is called offshoring and companies contract with firms in other countries to do such business processes as human resources, payroll, and accounting c) Companies are under a great deal of scrutiny to manage costs and generate revenue so they contract with foreign firms to do various business processes at a lower cost to the company d) all of the above statements describe this model 13. Which of the following is not a concern of the financing process? a) Effective cash management b) Optimizing an organization’s cost of capital c) Minimizing an organization’s borrowings d) Projecting cash flows
  • 6. 14. Business process reengineering efforts sometimes fail because: a. Management gets too involved in the process b. Management is too optimistic regarding its expectations from its implementation c. Management support can never overcome employee resistance d. Employees will never accept change 15. Which of the following technologies are now used in conjunction with automated production process systems to increase efficiencies? a) Radio frequency technology b) Bar code scanners c) RF IDs and advanced electronic tags d) all of the above e) none of the above 16. According to the textbook, which of these statements is most accurate? a) Most computer abuse is performed as retaliation against employers b) Very little computer crime is committed for personal gain c) Some computer abuse is performed simply to meet a challenge
  • 7. d) We catch most computer abusers with good accounting controls 17.Which of the following is probably the primary reason accountants should be concerned about computer crime and abuse? a) They might lose their job if they don’t detect computer crime or abuse in their organization b) They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it c) They are responsible for designing, implementing, and monitoring the control procedures for AISs d) none of the above 18.One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system? a) Salami technique b) Data diddling c) Shoulder surfing d) Trojan horse program
  • 8. 19.Regarding a company's audit trail, which of the following statements is true? a) Because of the complexities involved in establishing an audit trail, a good audit trail normally makes it more difficult for an individual to follow the flow of a company's business transactions through the company's information system b) In actuality, the audit trail established within a company's information system is an unimportant element of the company's internal control system c) When a company's audit trail becomes more difficult to follow, this causes an increase in the risk of errors or irregularities taking place in the processing of accounting transactions and not being detected d) A company's policies and procedures manual should not be part of its audit trail since confidential information is included within this manual 20.Which of the following statements is true regarding timely performance reports? a. In many companies, these reports are the major means of providing information to management concerning the actual operations of the companies’ internal control systems b. These reports should only include monetary data c. Since these reports fail to provide feedback to management on the operations of previously implemented internal control procedures, other techniques are needed to provide this feedback to managers
  • 9. d. The complexity that a computer introduces into a company's information system will typically prevent the preparation of timely performance reports for the company's management 21. _________________ describes the policies, plans, and procedures implemented by a firm to protect its assets. a) Internal control b) SAS No. 94 c) SOX, Section 404 d) Enterprise risk management 22. General controls within IT environments that affect personnel include: a) Use of computer accounts b) Separation of duties c) Informal knowledge of employees d) all of the above affect personnel 23. Which of the following best describes a fundamental control weakness often associated with automated data processing systems? a. Automated¬ data processing equipment is more subject to systems error than manual processing is subject to human error
  • 10. b. Automated data processing equipment processes and records similar transactions in a similar manner c. Automated data processing procedures for detection of invalid and unusual transactions are less effective than manual control procedures d. Functions that would normally be separated in a manual system are combined in an automated data processing system 24. The textbook identifies a number of issues that should be considered when developing a security policy. One of the issues is “identify threats”. Which of the following is not an example of this issue? a) What assets need to be protected b) What are the sources of potential security problems c) External threats are viruses, worms, retaliations from former employees d) Internal threats are misuse of assets by employees and embezzlement 25 Which of these is not a phase in the life cycle of an information system? a) Planning b) Analysis c) Control d) Implementation
  • 11. 26. A poorly-planned information system can result in: a) Employee resistance and even sabotage b) Inflexible systems that are hard to maintain or modify c) Systems that solve the wrong problems d) all of these 27. Which of the following is not a general objective in the design of an information system? a) A system should provide information which is timely and relevant for decision making by management and operating personnel b) The output of a system should be highly accurate c) A system should have sufficient capacity to accommodate levels of normal activity; any additional capacity proves too costly in the long run d) A system should be as simple as permitted so that its structure and operation can be easily understood and its procedures easily accomplished e) A system should be flexible to accommodate changes of a reasonable magnitude when required 28. A computerized AIS is harder to audit than a manual system for all of the following reasons except:
  • 12. a) The file information is not human readable b) The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems c) An audit trail does not exist in a computerized AIS d) Computerized systems often use remote real-time data processing, thus complicating the tracing of transaction records to their sources 29. Which of the following is not one of the groups of SOX compliance requirements? a) requirements to use an IT auditor to evaluate controls b) regulations governing executive reporting and conduct c) rules about financial statement reporting d) audit committee/corporate governance requirements 30. Three common techniques auditors use to test computer programs are: a) Test data, integrated test facilities, and parallel simulation b) Test data, edit checks, and integrated test facilities c) Test data, program change control, and parallel simulation d) Program change control, edit checks, and parallel simulation
  • 13. 31. The term data encryption refers to: a) Storing data in safe places called “crypts” b) Transforming data into secret codes c) Scrambling data in random ways that cannot be unscrambled d) none of these 32. The term key in the context of data encryption refers to: a) A physical key similar to a house key b) A logical key similar to the primary key of a data file c) A mathematical function used for encryption purposes d) A computer function key that can be found on keyboards 33. All of the following are benefits of XBRL except: a) Companies can file financial information in one format, avoiding the errors that may come from reentering data multiple times b) The SEC accepts XBRL-format for electronic filing of financial statement reports c) XBRL permits the automatic and reliable exchange of financial information across all software formats and technologies, including the Internet d) all of the above are benefits of XBRL e) none of the above are benefits of XBRL
  • 14. 34. All of these are reasons why databases are important to AISs except: a) AIS databases store valuable information b) Many AISs are large and therefore potentially unwieldy c) The databases of some organizations are very complex d) The hard disk space used to store AIS databases is comparatively expensive e) all of these are reasons why databases are important to AISs 35. A major advantage of relational databases is: a) All records are stored together b) No pointers are used c) An expandable index is used d) It closely resembles a flat file 36. In recent years many businesses have formed a common information source within their business organization called a database. One of the advantages of building databases is the simultaneous updating of files with common data elements. Another major advantage of the database concept is that: a) Database systems can be used in microcomputers as well as on large computers b) Database systems are simple to install and maintain
  • 15. c) Database systems are generally less expensive than separate file maintenance systems d) Less duplication of data occurs with a database system e) Fewer skilled people are required to run a database system than any other system 37. The process of data normalization refers to: a) Eliminating data errors and other problems from “normal data” b) Scaling data to values between zero and one c) Storing data in normal storage media such as hard disks d) none of these 38. Database management systems are important to accountants because: a) They automate file storage tasks and enable managers to generate worthwhile financial reports b) They eliminate data redundancy c) They are unique data structures which accountants have never used before d) They are easy to develop and therefore save money e) They are energy efficient
  • 16. 39. Which of these is true about finding data in multimedia databases? a) It is not possible to search them because graphics have no text keys for searching b) It is not possible to search them because audio objects have no text keys for searching c) It is possible to search for items in them because such characteristics as “speaker” or “subject” can be used as search parameters d) It is possible to search for items in them if the name of the embedded graphics or audio file is also known =============================================== ACC 340 Week 1 Connect Knowledge Check For more course tutorials visit www.newtonhelp.com 1. The Certified Information Technology Professional is the position created by the AICPA to recognize CPAs who have the ability to provide skilled professional services on Information Technology. True
  • 17. False 2. The correct order of effects in the value chain are: Inbound Logistics → Operations → Service Inbound Logistics → Outbound Logistics → Marketing & Sales Inbound Logistics → Operations → Outbound Logistics Inbound Logistics → Operations → Shipping 3. Which designation would most appropriate for those professionals possessing an IT audit, control and security skills? Certified Internal Auditor (CIA) Certified Information Systems Auditors (CISA) Certified Information Technology Professional (CITP) Certified Public Accountant (CPA) 4. Business Process Modeling Notation (BPMN) activity diagrams depict activities as circles. True
  • 18. False 5. Obligatory business rules state what should not occur. True False 6. Which of the following is not a Stewardship and Reporting role of the Accounting/Finance Function in Business? Tax returns Regulatory compliance Statutory reporting Human Resource management 7. Many hospitals and doctor's offices are beginning to digitize the medical records of their patients. This is an example of the ____________ strategic role. Informate - up Automate Transform Informate - down
  • 19. 8. Which of the following best describes a business model? A simple, abstract representation of a business process or processes. A sequence of business activities. An evaluation of potential business process improvements. None of the above. 9. Which of the following is the best description of an association? The relationship between two classes The lines in a UML Class diagram A group of classes The number of times one class is related to another 10. Which of the following best describes the purpose of a gateway in a Business Process Modeling Notation (BPMN) activity diagram? Controls branching and merging. Shows where the work takes place. Describes the sequence of workflow. Affects the flow of the business process. ===============================================
  • 20. ACC 340 Week 1 Discussion Question 1 For more course tutorials visit www.newtonhelp.com Why do some organizations continue to use both manual and computerized accounting information systems?e business process. =============================================== ACC 340 Week 1 Textbook Assignment Problem 6 Ch. 1 For more course tutorials visit www.newtonhelp.com Write a response of no more than 1,050 words to Problem 6 from Ch. 1, "Accounting Information Systems and Firm Value" of Accounting Information Systems. Click the Assignment Files tab to submit your assignment.
  • 21. Using the accompanying explanations of each IT strategic role, suggest the appropriate IT strategic role (automate, informate or transform) for the following types of IT investments. Depending on your interpretation, it is possible that some of the IT investments could include two IT strategic roles. a.Digital health records b.Google Maps that recommend hotels and restaurants along a trip path 25 c.Customer relationship management software d.Supply chain management software e.Enterprise systems f.Airline flight reservations systems g.PayPal (www.paypal.com) h.Amazon.com product recommendation on your homepage i.eBay j.Course and teacher evaluations conducted online for the first time (instead of on paper) =============================================== ACC 340 Week 2 Connect Knowledge Check For more course tutorials visit
  • 22. www.newtonhelp.com 1. Control Objectives for Information and related Technology's (CobIT) guidance is guided by a structure that corresponds to the SDLC, namely: Plan and Organize, Acquire and Implement, Deliver and Support and Monitor and Evaluate. True False 2. While hierarchical and network data models require relationships to be formed at the database creation, relational data models can be made up as needed. True False 3. The project sponsor is generally the same person as the project manager. True False 4.
  • 23. The 100% Rule is a rule requiring 100% planning of all external tasks. True False 5. The analysis phase of the SDLC involves a complete, detailed analysis of the systems needs of the end user. True False 6. To convert a conceptual model with a maximum Multiplicities relationship of "many to many" into relationship database tables, one must Many-to-many relationship cannot be represented in Access. Create a relationship table to handle the many-to-many relationship. Create a relation with no attributes of its own. Create a foreign key in one of the tables to link the two tables. 7. The Project Manager is the lead member of the project team that is responsible for the project. True False 8.
  • 24. The critical path in a PERT chart represents: The most important tasks of the whole project. The longest path of tasks needed for project completion. The tasks that must be completed without errors. The path of processes that is critical for system adoption. 9. The triple constraint of project management includes the constraint of: Adoption Usability Technical issues Time 10. In Access, users can edit database information in reports. True false =============================================== ACC 340 Week 2 Discussion Question 1
  • 25. For more course tutorials visit www.newtonhelp.com What are some of the hardware components of your PC at work? How are they different from the components of your PC at home? =============================================== ACC 340 Week 2 Discussion Question 2 For more course tutorials visit www.newtonhelp.com What are the benefits and limitations of the network being used at your organization? =============================================== ACC 340 Week 2 Enterprise Systems Paper For more course tutorials visit www.newtonhelp.com
  • 26. Prepare a 700- to 1,050-word paper to include the following: Describe the various types of enterprise wide accounting systems used in organizations. Explain how you might use the information system development process to implement a new system for your organization. Discuss the steps involved in the development process. Include a summary of the advantages and disadvantages of the different types of databases that are used in accounting systems. Click the Assignment Files tab to submit your assignment. =============================================== ACC 340 Week 2 Team Assignment Business Process For more course tutorials visit www.newtonhelp.com Select a company that you are familiar with to use as the basis for your assignment.
  • 27. Select a business activity in your selected company. For example, the sales activity, the accounting activity, the manufacturing activity, the hiring activity, etc. Prepare a 10- to 12-slide presentation to include the following: Speaker notes. A description of the business activity process. A Business Process Modeling Notation (BPMN) activity model for the selected business activity. An explanation of how the use of technology will impact this business activity and the accounting for this activity. Click the Assignment Files tab to submit. =============================================== ACC 340 Week 3 Discussion Question 1 For more course tutorials visit www.newtonhelp.com What are the advantages of a relational approach to database design? What are the drawbacks? ===============================================
  • 28. ACC 340 Week 3 Discussion Question 2 For more course tutorials visit www.newtonhelp.com Does your firm use a DBMS? Can you tell us about it? =============================================== ACC 340 Week 3 Team Database and Reports For more course tutorials visit www.newtonhelp.com Use your selected business activity from Week 2. Design at least two relational database tables. Identify the primary keys and foreign keys for your tables. Determine the reports you would create to assist management evaluate and monitor the business process.
  • 29. Identify the relationships (using keys) that are needed to create these reports. Click the Assignment Files tab to submit your assignment. Note. Grades are awarded based upon individual contributions to the Learning Team assignment. Each Learning Team member receives a grade based upon his/her contributions to the team assignment. Not all students may receive the same grade for the team assignment. =============================================== ACC 340 Week 4 Connect Knowledge Check For more course tutorials visit www.newtonhelp.com 1. Investments in business analytics systems support the balanced scorecard management process during the Link to Operations step. True False 2. The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known is called:
  • 30. Data Warehouse Business Intelligence Data Mining Data Mart 3. Which of the following is not a value proposition characteristic expected to influence customer value? Product attributes Image Relationship Innovation 4. Since both are regulators, the SEC and the IRS will likely have similar XBRL style sheets for the various XBRL filings. True False 5. XBRL GL (also known as XBRL Global Ledger Taxonomy) serves as a means to facilitate efficient communication within a firm. True False
  • 31. 6. Network IT changes the way that work if performed and decisions are made. True False 7. Which of the following is not a step in the balanced scorecard management process? Adapt Invest Monitor Translate 8. In February 2009, the _____________ passed the rule requiring all large domestic firms to begin formatting their financial statements using XBRL. Financial Accounting Standards Board American Institute of Certified Public Accountants International Accounting Standards Board Securities and Exchange Commission 9.
  • 32. XBRL assurance is generally expected to include: The most current, standardized XBRL taxonomy is used. The underlying financial and nonfinancial data that is used in XBRL tagging is reliable. The XBRL tagging is accurate and complete. The reports include all relevant financial and nonfinancial information. 10. Which of the following is the best description of the Link to Operations step in the balanced scorecard management process? The company examines the competitive environment. The company establishes objectives, measures, targets, and initiatives. The company prepares operating budgets and prioritizes business process improvements. The company evaluates the effectiveness of its strategy. =============================================== ACC 340 Week 4 Discussion Question 1 For more course tutorials visit www.newtonhelp.com
  • 33. What are the steps in the SDLC? Which is most important? What are the ramifications of skipping one of these steps? =============================================== ACC 340 Week 4 Discussion Question 2 For more course tutorials visit www.newtonhelp.com What is your personal involvement in determining IS requirements? =============================================== ACC 340 Week 4 Textbook Assignment Ch 13 Problem 1 and 2 For more course tutorials visit www.newtonhelp.com
  • 34. Write a response of no more than 1,050 words to Problems 1 and 2 from Ch. 13, "The Balanced Scorecard and Business Value of Information Technology" on pp. 272 of Accounting Information Systems. Click the Assignment Files tab to submit your assignment. 1. Select a prominent public company, such as Apple, Google, or Microsoft. Obtain recent annual reports and news articles about the company. Using that information, develop a strategy map that describes the company’s performance. Start by defining its value proposition, and then identifying key business processes that deliver that value proposition. 2. Use the company that you selected for Problem 1. Identify examples of its learning and growth efforts and explain how those might affect its business process performance. =============================================== ACC 340 Week 5 Computer Fraud Paper For more course tutorials visit www.newtonhelp.com Prepare a 700- to 1,050-word article summary about a recent data breach or computer fraud at an organization to include the following:
  • 35. Describe the circumstances involved and the results of the event. Explain how the data breach occurred and what could have been done to prevent the breach/fraud from occurring. Discuss what the organization has done or is doing to prevent the breach/fraud from occurring in the future. Discuss the impact of the breach/fraud on the organization. Discuss whether you believe that most incidents of data breaches and fraud are reported to the public. Why or why not? Click the Assignment Files tab to submit your assignment. =============================================== ACC 340 Week 5 Discussion Question 1 For more course tutorials visit www.newtonhelp.com What is the difference between a general control and an application control? =============================================== ACC 340 Week 5 Discussion Question 2
  • 36. For more course tutorials visit www.newtonhelp.com What internal controls can be implemented using information systems to safeguard your organization’s electronic assets? =============================================== ACC 340 Week 5 Individual Assignment Final Exam For more course tutorials visit www.newtonhelp.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation
  • 37. d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often recurring and are difficult to estimate c) Many benefits are intangible and are not easily known or measured d) Justifying a new technology is no different from any other capital budgeting problem 3. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow up 4. What is the first step to be performed by most organizations in their accounting cycles? a) Recording business transactions in a journal b) Preparing a trial balance c) Recording closing entries in a journal
  • 38. d) Preparing transaction source documents e) none of the above 5. Which systems study step is normally performed first? a) Design b) Initial operation c) Follow up d) Analysis e) none of the above 6. The purpose of a company firewall is to: a) Guard against spoofing b) Assist the IETF c) Deny computer hackers access to sensitive data d) all of the above 7. The term data encryption refers to: a) Storing data in safe places called “crypts” b) Transforming data into secret codes c) Scrambling data in random ways that cannot be unscrambled d) none of these
  • 39. 8. An advantage of an extranet is that: a) It can disseminate information corporate wide b) It can be accessed by selected trading partners c) Users can employ common web browsers to access information in them d) all of the above 9. Another name for an Internet domain address is its: a) URL b) ISP c) email address d) IETF 10. Business process reengineering efforts sometimes fail because: a) Management gets too involved in the process b) Management is too optimistic regarding its expectations from its implementation c) Management support can never overcome employee resistance d) Employees will never accept change
  • 40. 11. The sales process begins with: a) Placing an order with a vendor b) A customer order for goods or services c) Production of goods or services d) Delivery of goods or services 12. The primary objective in processing revenues is to: a) Sell as many goods as possible b) Achieve timely and efficient cash collection c) Maximize an organization’s sales orders d) Only sell goods to customers who can pay their bills 13. An important input to the sales process is: a) A customer sales order b) The cash forecast c) Aged accounts receivable information d) A receiving report 14. Which of the following is not an example of a source document? a) Receiving report b) Purchase order c) Sales order d) Aging report
  • 41. 15. Inputs to transaction processing systems: a) Are always in hard copy b) Are best when input in a graphical format c) May be in an electronic format when an EDI system is used d) May never be audio 16.Integrated accounting software programs generally include all of the following, except: a) Graphic reporting capabilities b) Internet connectivity c) One standardized chart of accounts d) The ability to handle multiple companies 17. Enterprise-wide AISs: a) Almost never pay for themselves b) Do not include many more features than middle-range accounting software packages c) Are seldom used by multinational organizations d) Integrate an organization’s financial functions with its other functional areas 18. Training and change management activities: a) Take place just before the go live stage of implementation
  • 42. b) Are most effective when conducted throughout design, go live, and post-implementation follow-up c) Include technical training only d) Do not include the design of user interfaces 19. Which of the following software packages is not an example of a middle-range AIS? a) Great Plains Dynamics b) MAS 90 c) SAP R/3 d) Solomon 20. Many organizations purchased new AISs during the 1990’s: a) Because of the need for Year 2000 compliance b) Because they wanted Internet connectivity c) In order to take advantage of opportunities for reengineering d) all of the above ===============================================