SlideShare a Scribd company logo
ACC 340 Final Exam Guide
For more classes visit
www.snaptutorial.com
Multiple-Choice Questions
1. The process by which a financial transaction is recorded so that its
flow through the system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail
2. Justifying expenditures for new technologies is especially difficult
because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital
budgeting problem
3. The essential steps in performing a systems study are (in order of
occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow up
4. What is the first step to be performed by most organizations in their
accounting cycles?
a) Recording business transactions in a journal
b) Preparing a trial balance
c) Recording closing entries in a journal
d) Preparing transaction source documents
e) none of the above
5. Which systems study step is normally performed first?
a) Design
b) Initial operation
c) Follow up
d) Analysis
e) none of the above
6. The purpose of a company firewall is to:
a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above
7. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
8. An advantage of an extranet is that:
a) It can disseminate information corporate wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in
them
d) all of the above
9. Another name for an Internet domain address is its:
a) URL
b) ISP
c) email address
d) IETF
10. Business process reengineering efforts sometimes fail
because:
a) Management gets too involved in the process
b) Management is too optimistic regarding its expectations from
its implementation
c) Management support can never overcome employee
resistance
d) Employees will never accept change
11. The sales process begins with:
a) Placing an order with a vendor
b) A customer order for goods or services
c) Production of goods or services
d) Delivery of goods or services
12. The primary objective in processing revenues is to:
a) Sell as many goods as possible
b) Achieve timely and efficient cash collection
c) Maximize an organization’s sales orders
d) Only sell goods to customers who can pay their bills
13. An important input to the sales process is:
a) A customer sales order
b) The cash forecast
c) Aged accounts receivable information
d) A receiving report
14. Which of the following is not an example of a source document?
a) Receiving report
b) Purchase order
c) Sales order
d) Aging report
15. Inputs to transaction processing systems:
a) Are always in hard copy
b) Are best when input in a graphical format
c) May be in an electronic format when an EDI system is used
d) May never be audio
16.Integrated accounting software programs generally include all of the
following, except:
a) Graphic reporting capabilities
b) Internet connectivity
c) One standardized chart of accounts
d) The ability to handle multiple companies
17. Enterprise-wide AISs:
a) Almost never pay for themselves
b) Do not include many more features than middle-range accounting
software packages
c) Are seldom used by multinational organizations
d) Integrate an organization’s financial functions with its other
functional areas
18. Training and change management activities:
a) Take place just before the go live stage of implementation
b) Are most effective when conducted throughout design, go live, and
post-implementation follow-up
c) Include technical training only
d) Do not include the design of user interfaces
19. Which of the following software packages is not an example of a
middle-range AIS?
a) Great Plains Dynamics
b) MAS 90
c) SAP R/3
d) Solomon
20. Many organizations purchased new AISs during the 1990’s:
a) Because of the need for Year 2000 compliance
b) Because they wanted Internet connectivity
c) In order to take advantage of opportunities for reengineering
d) all of the above
.....................................................................................................................
.........................................
ACC 340 Week 1 Connect Knowledge Check
For more classes visit
www.snaptutorial.com
1.
The Certified Information Technology Professional is the position
created by the AICPA to recognize CPAs who have the ability to
provide skilled professional services on Information Technology.
True
False
2.
The correct order of effects in the value chain are:
Inbound Logistics → Operations → Service
Inbound Logistics → Outbound Logistics → Marketing & Sales
Inbound Logistics → Operations → Outbound Logistics
Inbound Logistics → Operations → Shipping
3.
Which designation would most appropriate for those professionals
possessing an IT audit, control and security skills?
Certified Internal Auditor (CIA)
Certified Information Systems Auditors (CISA)
Certified Information Technology Professional (CITP)
Certified Public Accountant (CPA)
4.
Business Process Modeling Notation (BPMN) activity diagrams depict
activities as circles.
True
False
5.
Obligatory business rules state what should not occur.
True
False
6.
Which of the following is not a Stewardship and Reporting role of the
Accounting/Finance Function in Business?
Tax returns
Regulatory compliance
Statutory reporting
Human Resource management
7.
Many hospitals and doctor's offices are beginning to digitize the medical
records of their patients. This is an example of the ____________
strategic role.
Informate - up
Automate
Transform
Informate - down
8.
Which of the following best describes a business model?
A simple, abstract representation of a business process or processes.
A sequence of business activities.
An evaluation of potential business process improvements.
None of the above.
9.
Which of the following is the best description of an association?
The relationship between two classes
The lines in a UML Class diagram
A group of classes
The number of times one class is related to another
10.
Which of the following best describes the purpose of a gateway in a
Business Process Modeling Notation (BPMN) activity diagram?
Controls branching and merging.
Shows where the work takes place.
Describes the sequence of workflow.
Affects the flow of the business process.
.....................................................................................................................
.........................................
ACC 340 Week 1 Discussion Question 1
For more classes visit
www.snaptutorial.com
Why do some organizations continue to use both manual and
computerized accounting information systems?
.....................................................................................................................
.........................................
ACC 340 Week 1 Textbook Assignment Problem
6 Ch. 1
For more classes visit
www.snaptutorial.com
Write a response of no more than 1,050 words to Problem 6 from Ch. 1,
"Accounting Information Systems and Firm Value" of Accounting
Information Systems.
Click the Assignment Files tab to submit your assignment.
Using the accompanying explanations of each IT strategic role, suggest
the appropriate IT strategic role (automate, informate or transform) for
the following types of IT investments. Depending on your interpretation,
it is possible that some of the IT investments could include two IT
strategic roles.
a.Digital health records
b.Google Maps that recommend hotels and restaurants along a trip path
25
c.Customer relationship management software
d.Supply chain management software
e.Enterprise systems
f.Airline flight reservations systems
g.PayPal (www.paypal.com)
h.Amazon.com product recommendation on your homepage
i.eBay
j.Course and teacher evaluations conducted online for the first time
(instead of on paper)
.....................................................................................................................
.........................................
ACC 340 Week 2 Connect Knowledge Check
For more classes visit
www.snaptutorial.com
1.
Control Objectives for Information and related Technology's (CobIT)
guidance is guided by a structure that corresponds to the SDLC, namely:
Plan and Organize, Acquire and Implement, Deliver and Support and
Monitor and Evaluate.
True
False
2.
While hierarchical and network data models require relationships to be
formed at the database creation, relational data models can be made up
as needed.
True
False
3.
The project sponsor is generally the same person as the project manager.
True
False
4.
The 100% Rule is a rule requiring 100% planning of all external tasks.
True
False
5.
The analysis phase of the SDLC involves a complete, detailed analysis
of the systems needs of the end user.
True
False
6.
To convert a conceptual model with a maximum Multiplicities
relationship of "many to many" into relationship database tables, one
must
Many-to-many relationship cannot be represented in Access.
Create a relationship table to handle the many-to-many relationship.
Create a relation with no attributes of its own.
Create a foreign key in one of the tables to link the two tables.
7.
The Project Manager is the lead member of the project team that is
responsible for the project.
True
False
8.
The critical path in a PERT chart represents:
The most important tasks of the whole project.
The longest path of tasks needed for project completion.
The tasks that must be completed without errors.
The path of processes that is critical for system adoption.
9.
The triple constraint of project management includes the constraint of:
Adoption
Usability
Technical issues
Time
10.
In Access, users can edit database information in reports.
True
False
.....................................................................................................................
.........................................
ACC 340 Week 2 Discussion Question 1
For more classes visit
www.snaptutorial.com
What are some of the hardware components of your PC at work? How
are they different from the components of your PC at home?
.....................................................................................................................
.........................................
ACC 340 Week 2 Discussion Question 2
For more classes visit
www.snaptutorial.com
What are the benefits and limitations of the network being used at your
organization?
.....................................................................................................................
.........................................
ACC 340 Week 2 Enterprise Systems Paper
For more classes visit
www.snaptutorial.com
Prepare a 700- to 1,050-word paper to include the following:
 Describe the various types of enterprise wide accounting systems
used in organizations.
 Explain how you might use the information system development
process to implement a new system for your organization.
 Discuss the steps involved in the development process.
 Include a summary of the advantages and disadvantages of the
different types of databases that are used in accounting systems.
Click the Assignment Files tab to submit your assignment.
.....................................................................................................................
.........................................
ACC 340 Week 2 Team Assignment Business
Process
For more classes visit
www.snaptutorial.com
Select a company that you are familiar with to use as the basis for your
assignment.
Select a business activity in your selected company. For example, the
sales activity, the accounting activity, the manufacturing activity, the
hiring activity, etc.
Prepare a 10- to 12-slide presentation to include the following:
 Speaker notes.
 A description of the business activity process.
 A Business Process Modeling Notation (BPMN) activity model for
the selected business activity.
 An explanation of how the use of technology will impact this
business activity and the accounting for this activity.
Click the Assignment Files tab to submit.
.....................................................................................................................
.........................................
ACC 340 Week 3 Discussion Question 1
For more classes visit
www.snaptutorial.com
What are the advantages of a relational approach to database design?
What are the drawbacks?
.....................................................................................................................
.........................................
ACC 340 Week 3 Discussion Question 2
For more classes visit
www.snaptutorial.com
Does your firm use a DBMS? Can you tell us about it?
.....................................................................................................................
.........................................
ACC 340 Week 3 Team Database and Reports
For more classes visit
www.snaptutorial.com
Use your selected business activity from Week 2.
Design at least two relational database tables.
Identify the primary keys and foreign keys for your tables.
Determine the reports you would create to assist management evaluate
and monitor the business process.
Identify the relationships (using keys) that are needed to create these
reports.
Click the Assignment Files tab to submit your assignment.
Note. Grades are awarded based upon individual contributions to the
Learning Team assignment. Each Learning Team member receives a
grade based upon his/her contributions to the team assignment. Not all
students may receive the same grade for the team assignment.
.....................................................................................................................
.........................................
ACC 340 Week 4 Connect Knowledge Check
For more classes visit
www.snaptutorial.com
1.
Investments in business analytics systems support the balanced
scorecard management process during the Link to Operations step.
True
False
2.
The process of using sophisticated statistical techniques to extract and
analyze data from large databases to discern patterns and trends that
were not previously known is called:
Data Warehouse
Business Intelligence
Data Mining
Data Mart
3.
Which of the following is not a value proposition characteristic expected
to influence customer value?
Product attributes
Image
Relationship
Innovation
4.
Since both are regulators, the SEC and the IRS will likely have similar
XBRL style sheets for the various XBRL filings.
True
False
5.
XBRL GL (also known as XBRL Global Ledger Taxonomy) serves as a
means to facilitate efficient communication within a firm.
True
False
6.
Network IT changes the way that work if performed and decisions are
made.
True
False
7.
Which of the following is not a step in the balanced scorecard
management process?
Adapt
Invest
Monitor
Translate
8.
In February 2009, the _____________ passed the rule requiring all large
domestic firms to begin formatting their financial statements using
XBRL.
Financial Accounting Standards Board
American Institute of Certified Public Accountants
International Accounting Standards Board
Securities and Exchange Commission
9.
XBRL assurance is generally expected to include:
The most current, standardized XBRL taxonomy is used.
The underlying financial and nonfinancial data that is used in XBRL
tagging is reliable.
The XBRL tagging is accurate and complete.
The reports include all relevant financial and nonfinancial information.
10.
Which of the following is the best description of the Link to Operations
step in the balanced scorecard management process?
The company examines the competitive environment.
The company establishes objectives, measures, targets, and initiatives.
The company prepares operating budgets and prioritizes business
process improvements.
The company evaluates the effectiveness of its strategy.
.....................................................................................................................
.........................................
ACC 340 Week 4 Discussion Question 1
For more classes visit
www.snaptutorial.com
What are the steps in the SDLC? Which is most important? What are the
ramifications of skipping one of these steps?
.....................................................................................................................
.........................................
ACC 340 Week 4 Discussion Question 2
For more classes visit
www.snaptutorial.com
What is your personal involvement in determining IS requirements?
.....................................................................................................................
.........................................
ACC 340 Week 4 Textbook Assignment Ch 13
Problem 1 and 2
For more classes visit
www.snaptutorial.com
Write a response of no more than 1,050 words to Problems 1 and 2 from
Ch. 13, "The Balanced Scorecard and Business Value of Information
Technology" on pp. 272 of Accounting Information Systems.
Click the Assignment Files tab to submit your assignment.
1. Select a prominent public company, such as Apple, Google, or
Microsoft. Obtain recent annual reports and news articles about the
company. Using that information, develop a strategy map that describes
the company’s performance. Start by defining its value proposition, and
then identifying key business processes that deliver that value
proposition.
2. Use the company that you selected for Problem 1. Identify examples
of its learning and growth efforts and explain how those might affect its
business process performance.
.....................................................................................................................
.........................................
ACC 340 Week 5 Computer Fraud Paper
For more classes visit
www.snaptutorial.com
Prepare a 700- to 1,050-word article summary about a recent data
breach or computer fraud at an organization to include the following:
 Describe the circumstances involved and the results of the event.
 Explain how the data breach occurred and what could have been
done to prevent the breach/fraud from occurring.
 Discuss what the organization has done or is doing to prevent the
breach/fraud from occurring in the future.
 Discuss the impact of the breach/fraud on the organization.
 Discuss whether you believe that most incidents of data breaches
and fraud are reported to the public. Why or why not?
Click the Assignment Files tab to submit your assignment.
.....................................................................................................................
.........................................
ACC 340 Week 5 Discussion Question 1
For more classes visit
www.snaptutorial.com
What is the difference between a general control and an application
control?
.....................................................................................................................
.........................................
ACC 340 Week 5 Discussion Question 2
For more classes visit
www.snaptutorial.com
What internal controls can be implemented using information systems to
safeguard your organization’s electronic assets?
.....................................................................................................................
.........................................
ACC 340 Week 5 Individual Assignment Final
Exam
For more classes visit
www.snaptutorial.com
Multiple-Choice Questions
1. The process by which a financial transaction is recorded so that its
flow through the system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail
2. Justifying expenditures for new technologies is especially difficult
because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital
budgeting problem
3. The essential steps in performing a systems study are (in order of
occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow up
4. What is the first step to be performed by most organizations in their
accounting cycles?
a) Recording business transactions in a journal
b) Preparing a trial balance
c) Recording closing entries in a journal
d) Preparing transaction source documents
e) none of the above
5. Which systems study step is normally performed first?
a) Design
b) Initial operation
c) Follow up
d) Analysis
e) none of the above
6. The purpose of a company firewall is to:
a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above
7. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
8. An advantage of an extranet is that:
a) It can disseminate information corporate wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in
them
d) all of the above
9. Another name for an Internet domain address is its:
a) URL
b) ISP
c) email address
d) IETF
10. Business process reengineering efforts sometimes fail
because:
a) Management gets too involved in the process
b) Management is too optimistic regarding its expectations from
its implementation
c) Management support can never overcome employee
resistance
d) Employees will never accept change
11. The sales process begins with:
a) Placing an order with a vendor
b) A customer order for goods or services
c) Production of goods or services
d) Delivery of goods or services
12. The primary objective in processing revenues is to:
a) Sell as many goods as possible
b) Achieve timely and efficient cash collection
c) Maximize an organization’s sales orders
d) Only sell goods to customers who can pay their bills
13. An important input to the sales process is:
a) A customer sales order
b) The cash forecast
c) Aged accounts receivable information
d) A receiving report
14. Which of the following is not an example of a source document?
a) Receiving report
b) Purchase order
c) Sales order
d) Aging report
15. Inputs to transaction processing systems:
a) Are always in hard copy
b) Are best when input in a graphical format
c) May be in an electronic format when an EDI system is used
d) May never be audio
16.Integrated accounting software programs generally include all of the
following, except:
a) Graphic reporting capabilities
b) Internet connectivity
c) One standardized chart of accounts
d) The ability to handle multiple companies
17. Enterprise-wide AISs:
a) Almost never pay for themselves
b) Do not include many more features than middle-range accounting
software packages
c) Are seldom used by multinational organizations
d) Integrate an organization’s financial functions with its other
functional areas
18. Training and change management activities:
a) Take place just before the go live stage of implementation
b) Are most effective when conducted throughout design, go live, and
post-implementation follow-up
c) Include technical training only
d) Do not include the design of user interfaces
19. Which of the following software packages is not an example of a
middle-range AIS?
a) Great Plains Dynamics
b) MAS 90
c) SAP R/3
d) Solomon
20. Many organizations purchased new AISs during the 1990’s:
a) Because of the need for Year 2000 compliance
b) Because they wanted Internet connectivity
c) In order to take advantage of opportunities for reengineering
d) all of the above

More Related Content

Similar to ACC 340 Extraordinary Success |snaptutorial.com

Chapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docxChapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docx
SamNguyn21
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
sarahlazeto
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
LillieDickey
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
Sarajacobe
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
MariaLouis2018
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
EmmaJack2018
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
emmywatson2017
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
sweetsour2017
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
KatherineJack1
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
lizabonilla
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
elizabethbrown2018
 
Smu mba semester 2
Smu mba semester 2Smu mba semester 2
Smu mba semester 2
Rajesh Kumar Singh
 
Enterprise Resource Planning
Enterprise Resource PlanningEnterprise Resource Planning
Enterprise Resource Planning
amitymbaassignment
 
Sample
SampleSample
Test
TestTest
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
mydrynan
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
MaryTurner2017
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
mariajackson2018
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
MaryLouis2018
 

Similar to ACC 340 Extraordinary Success |snaptutorial.com (20)

Chapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docxChapter_9-12_solution_-_Copy.docx
Chapter_9-12_solution_-_Copy.docx
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Smu mba semester 2
Smu mba semester 2Smu mba semester 2
Smu mba semester 2
 
Enterprise Resource Planning
Enterprise Resource PlanningEnterprise Resource Planning
Enterprise Resource Planning
 
Sample
SampleSample
Sample
 
Test
TestTest
Test
 
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docxFinal Examination1INFORMATION MANAGEMENTMultiple C.docx
Final Examination1INFORMATION MANAGEMENTMultiple C.docx
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
C a1 fin_10
C a1 fin_10C a1 fin_10
C a1 fin_10
 

Recently uploaded

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 

Recently uploaded (20)

special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 

ACC 340 Extraordinary Success |snaptutorial.com

  • 1. ACC 340 Final Exam Guide For more classes visit www.snaptutorial.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often recurring and are difficult to estimate
  • 2. c) Many benefits are intangible and are not easily known or measured d) Justifying a new technology is no different from any other capital budgeting problem 3. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow up 4. What is the first step to be performed by most organizations in their accounting cycles? a) Recording business transactions in a journal b) Preparing a trial balance c) Recording closing entries in a journal d) Preparing transaction source documents e) none of the above 5. Which systems study step is normally performed first? a) Design b) Initial operation c) Follow up d) Analysis e) none of the above 6. The purpose of a company firewall is to: a) Guard against spoofing b) Assist the IETF c) Deny computer hackers access to sensitive data d) all of the above 7. The term data encryption refers to: a) Storing data in safe places called “crypts” b) Transforming data into secret codes
  • 3. c) Scrambling data in random ways that cannot be unscrambled d) none of these 8. An advantage of an extranet is that: a) It can disseminate information corporate wide b) It can be accessed by selected trading partners c) Users can employ common web browsers to access information in them d) all of the above 9. Another name for an Internet domain address is its: a) URL b) ISP c) email address d) IETF 10. Business process reengineering efforts sometimes fail because: a) Management gets too involved in the process b) Management is too optimistic regarding its expectations from its implementation c) Management support can never overcome employee resistance d) Employees will never accept change 11. The sales process begins with: a) Placing an order with a vendor b) A customer order for goods or services c) Production of goods or services d) Delivery of goods or services 12. The primary objective in processing revenues is to: a) Sell as many goods as possible b) Achieve timely and efficient cash collection c) Maximize an organization’s sales orders
  • 4. d) Only sell goods to customers who can pay their bills 13. An important input to the sales process is: a) A customer sales order b) The cash forecast c) Aged accounts receivable information d) A receiving report 14. Which of the following is not an example of a source document? a) Receiving report b) Purchase order c) Sales order d) Aging report 15. Inputs to transaction processing systems: a) Are always in hard copy b) Are best when input in a graphical format c) May be in an electronic format when an EDI system is used d) May never be audio 16.Integrated accounting software programs generally include all of the following, except: a) Graphic reporting capabilities b) Internet connectivity c) One standardized chart of accounts d) The ability to handle multiple companies 17. Enterprise-wide AISs: a) Almost never pay for themselves b) Do not include many more features than middle-range accounting software packages c) Are seldom used by multinational organizations d) Integrate an organization’s financial functions with its other functional areas
  • 5. 18. Training and change management activities: a) Take place just before the go live stage of implementation b) Are most effective when conducted throughout design, go live, and post-implementation follow-up c) Include technical training only d) Do not include the design of user interfaces 19. Which of the following software packages is not an example of a middle-range AIS? a) Great Plains Dynamics b) MAS 90 c) SAP R/3 d) Solomon 20. Many organizations purchased new AISs during the 1990’s: a) Because of the need for Year 2000 compliance b) Because they wanted Internet connectivity c) In order to take advantage of opportunities for reengineering d) all of the above ..................................................................................................................... ......................................... ACC 340 Week 1 Connect Knowledge Check For more classes visit www.snaptutorial.com 1. The Certified Information Technology Professional is the position created by the AICPA to recognize CPAs who have the ability to provide skilled professional services on Information Technology.
  • 6. True False 2. The correct order of effects in the value chain are: Inbound Logistics → Operations → Service Inbound Logistics → Outbound Logistics → Marketing & Sales Inbound Logistics → Operations → Outbound Logistics Inbound Logistics → Operations → Shipping 3. Which designation would most appropriate for those professionals possessing an IT audit, control and security skills? Certified Internal Auditor (CIA) Certified Information Systems Auditors (CISA) Certified Information Technology Professional (CITP) Certified Public Accountant (CPA) 4. Business Process Modeling Notation (BPMN) activity diagrams depict activities as circles. True False 5. Obligatory business rules state what should not occur. True False 6. Which of the following is not a Stewardship and Reporting role of the Accounting/Finance Function in Business? Tax returns Regulatory compliance
  • 7. Statutory reporting Human Resource management 7. Many hospitals and doctor's offices are beginning to digitize the medical records of their patients. This is an example of the ____________ strategic role. Informate - up Automate Transform Informate - down 8. Which of the following best describes a business model? A simple, abstract representation of a business process or processes. A sequence of business activities. An evaluation of potential business process improvements. None of the above. 9. Which of the following is the best description of an association? The relationship between two classes The lines in a UML Class diagram A group of classes The number of times one class is related to another 10. Which of the following best describes the purpose of a gateway in a Business Process Modeling Notation (BPMN) activity diagram? Controls branching and merging. Shows where the work takes place. Describes the sequence of workflow. Affects the flow of the business process. ..................................................................................................................... ......................................... ACC 340 Week 1 Discussion Question 1
  • 8. For more classes visit www.snaptutorial.com Why do some organizations continue to use both manual and computerized accounting information systems? ..................................................................................................................... ......................................... ACC 340 Week 1 Textbook Assignment Problem 6 Ch. 1 For more classes visit www.snaptutorial.com Write a response of no more than 1,050 words to Problem 6 from Ch. 1, "Accounting Information Systems and Firm Value" of Accounting Information Systems. Click the Assignment Files tab to submit your assignment. Using the accompanying explanations of each IT strategic role, suggest the appropriate IT strategic role (automate, informate or transform) for the following types of IT investments. Depending on your interpretation, it is possible that some of the IT investments could include two IT strategic roles. a.Digital health records b.Google Maps that recommend hotels and restaurants along a trip path
  • 9. 25 c.Customer relationship management software d.Supply chain management software e.Enterprise systems f.Airline flight reservations systems g.PayPal (www.paypal.com) h.Amazon.com product recommendation on your homepage i.eBay j.Course and teacher evaluations conducted online for the first time (instead of on paper) ..................................................................................................................... ......................................... ACC 340 Week 2 Connect Knowledge Check For more classes visit www.snaptutorial.com 1. Control Objectives for Information and related Technology's (CobIT) guidance is guided by a structure that corresponds to the SDLC, namely: Plan and Organize, Acquire and Implement, Deliver and Support and Monitor and Evaluate. True False 2.
  • 10. While hierarchical and network data models require relationships to be formed at the database creation, relational data models can be made up as needed. True False 3. The project sponsor is generally the same person as the project manager. True False 4. The 100% Rule is a rule requiring 100% planning of all external tasks. True False 5. The analysis phase of the SDLC involves a complete, detailed analysis of the systems needs of the end user. True False 6.
  • 11. To convert a conceptual model with a maximum Multiplicities relationship of "many to many" into relationship database tables, one must Many-to-many relationship cannot be represented in Access. Create a relationship table to handle the many-to-many relationship. Create a relation with no attributes of its own. Create a foreign key in one of the tables to link the two tables. 7. The Project Manager is the lead member of the project team that is responsible for the project. True False 8. The critical path in a PERT chart represents: The most important tasks of the whole project. The longest path of tasks needed for project completion. The tasks that must be completed without errors. The path of processes that is critical for system adoption. 9. The triple constraint of project management includes the constraint of: Adoption Usability
  • 12. Technical issues Time 10. In Access, users can edit database information in reports. True False ..................................................................................................................... ......................................... ACC 340 Week 2 Discussion Question 1 For more classes visit www.snaptutorial.com What are some of the hardware components of your PC at work? How are they different from the components of your PC at home? ..................................................................................................................... ......................................... ACC 340 Week 2 Discussion Question 2 For more classes visit www.snaptutorial.com
  • 13. What are the benefits and limitations of the network being used at your organization? ..................................................................................................................... ......................................... ACC 340 Week 2 Enterprise Systems Paper For more classes visit www.snaptutorial.com Prepare a 700- to 1,050-word paper to include the following:  Describe the various types of enterprise wide accounting systems used in organizations.  Explain how you might use the information system development process to implement a new system for your organization.  Discuss the steps involved in the development process.  Include a summary of the advantages and disadvantages of the different types of databases that are used in accounting systems. Click the Assignment Files tab to submit your assignment. ..................................................................................................................... ......................................... ACC 340 Week 2 Team Assignment Business Process For more classes visit www.snaptutorial.com
  • 14. Select a company that you are familiar with to use as the basis for your assignment. Select a business activity in your selected company. For example, the sales activity, the accounting activity, the manufacturing activity, the hiring activity, etc. Prepare a 10- to 12-slide presentation to include the following:  Speaker notes.  A description of the business activity process.  A Business Process Modeling Notation (BPMN) activity model for the selected business activity.  An explanation of how the use of technology will impact this business activity and the accounting for this activity. Click the Assignment Files tab to submit. ..................................................................................................................... ......................................... ACC 340 Week 3 Discussion Question 1 For more classes visit www.snaptutorial.com What are the advantages of a relational approach to database design? What are the drawbacks? ..................................................................................................................... .........................................
  • 15. ACC 340 Week 3 Discussion Question 2 For more classes visit www.snaptutorial.com Does your firm use a DBMS? Can you tell us about it? ..................................................................................................................... ......................................... ACC 340 Week 3 Team Database and Reports For more classes visit www.snaptutorial.com Use your selected business activity from Week 2. Design at least two relational database tables. Identify the primary keys and foreign keys for your tables. Determine the reports you would create to assist management evaluate and monitor the business process. Identify the relationships (using keys) that are needed to create these reports. Click the Assignment Files tab to submit your assignment. Note. Grades are awarded based upon individual contributions to the Learning Team assignment. Each Learning Team member receives a grade based upon his/her contributions to the team assignment. Not all students may receive the same grade for the team assignment.
  • 16. ..................................................................................................................... ......................................... ACC 340 Week 4 Connect Knowledge Check For more classes visit www.snaptutorial.com 1. Investments in business analytics systems support the balanced scorecard management process during the Link to Operations step. True False 2. The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known is called: Data Warehouse Business Intelligence Data Mining Data Mart 3.
  • 17. Which of the following is not a value proposition characteristic expected to influence customer value? Product attributes Image Relationship Innovation 4. Since both are regulators, the SEC and the IRS will likely have similar XBRL style sheets for the various XBRL filings. True False 5. XBRL GL (also known as XBRL Global Ledger Taxonomy) serves as a means to facilitate efficient communication within a firm. True False 6. Network IT changes the way that work if performed and decisions are made. True False
  • 18. 7. Which of the following is not a step in the balanced scorecard management process? Adapt Invest Monitor Translate 8. In February 2009, the _____________ passed the rule requiring all large domestic firms to begin formatting their financial statements using XBRL. Financial Accounting Standards Board American Institute of Certified Public Accountants International Accounting Standards Board Securities and Exchange Commission 9. XBRL assurance is generally expected to include: The most current, standardized XBRL taxonomy is used. The underlying financial and nonfinancial data that is used in XBRL tagging is reliable. The XBRL tagging is accurate and complete. The reports include all relevant financial and nonfinancial information.
  • 19. 10. Which of the following is the best description of the Link to Operations step in the balanced scorecard management process? The company examines the competitive environment. The company establishes objectives, measures, targets, and initiatives. The company prepares operating budgets and prioritizes business process improvements. The company evaluates the effectiveness of its strategy. ..................................................................................................................... ......................................... ACC 340 Week 4 Discussion Question 1 For more classes visit www.snaptutorial.com What are the steps in the SDLC? Which is most important? What are the ramifications of skipping one of these steps? ..................................................................................................................... ......................................... ACC 340 Week 4 Discussion Question 2 For more classes visit www.snaptutorial.com
  • 20. What is your personal involvement in determining IS requirements? ..................................................................................................................... ......................................... ACC 340 Week 4 Textbook Assignment Ch 13 Problem 1 and 2 For more classes visit www.snaptutorial.com Write a response of no more than 1,050 words to Problems 1 and 2 from Ch. 13, "The Balanced Scorecard and Business Value of Information Technology" on pp. 272 of Accounting Information Systems. Click the Assignment Files tab to submit your assignment. 1. Select a prominent public company, such as Apple, Google, or Microsoft. Obtain recent annual reports and news articles about the company. Using that information, develop a strategy map that describes the company’s performance. Start by defining its value proposition, and then identifying key business processes that deliver that value proposition. 2. Use the company that you selected for Problem 1. Identify examples of its learning and growth efforts and explain how those might affect its business process performance. ..................................................................................................................... .........................................
  • 21. ACC 340 Week 5 Computer Fraud Paper For more classes visit www.snaptutorial.com Prepare a 700- to 1,050-word article summary about a recent data breach or computer fraud at an organization to include the following:  Describe the circumstances involved and the results of the event.  Explain how the data breach occurred and what could have been done to prevent the breach/fraud from occurring.  Discuss what the organization has done or is doing to prevent the breach/fraud from occurring in the future.  Discuss the impact of the breach/fraud on the organization.  Discuss whether you believe that most incidents of data breaches and fraud are reported to the public. Why or why not? Click the Assignment Files tab to submit your assignment. ..................................................................................................................... ......................................... ACC 340 Week 5 Discussion Question 1 For more classes visit www.snaptutorial.com What is the difference between a general control and an application control?
  • 22. ..................................................................................................................... ......................................... ACC 340 Week 5 Discussion Question 2 For more classes visit www.snaptutorial.com What internal controls can be implemented using information systems to safeguard your organization’s electronic assets? ..................................................................................................................... ......................................... ACC 340 Week 5 Individual Assignment Final Exam For more classes visit www.snaptutorial.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique
  • 23. c) Concatenation d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often recurring and are difficult to estimate c) Many benefits are intangible and are not easily known or measured d) Justifying a new technology is no different from any other capital budgeting problem 3. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow up 4. What is the first step to be performed by most organizations in their accounting cycles? a) Recording business transactions in a journal b) Preparing a trial balance c) Recording closing entries in a journal d) Preparing transaction source documents e) none of the above 5. Which systems study step is normally performed first? a) Design b) Initial operation c) Follow up d) Analysis e) none of the above 6. The purpose of a company firewall is to: a) Guard against spoofing
  • 24. b) Assist the IETF c) Deny computer hackers access to sensitive data d) all of the above 7. The term data encryption refers to: a) Storing data in safe places called “crypts” b) Transforming data into secret codes c) Scrambling data in random ways that cannot be unscrambled d) none of these 8. An advantage of an extranet is that: a) It can disseminate information corporate wide b) It can be accessed by selected trading partners c) Users can employ common web browsers to access information in them d) all of the above 9. Another name for an Internet domain address is its: a) URL b) ISP c) email address d) IETF 10. Business process reengineering efforts sometimes fail because: a) Management gets too involved in the process b) Management is too optimistic regarding its expectations from its implementation c) Management support can never overcome employee resistance d) Employees will never accept change 11. The sales process begins with: a) Placing an order with a vendor b) A customer order for goods or services
  • 25. c) Production of goods or services d) Delivery of goods or services 12. The primary objective in processing revenues is to: a) Sell as many goods as possible b) Achieve timely and efficient cash collection c) Maximize an organization’s sales orders d) Only sell goods to customers who can pay their bills 13. An important input to the sales process is: a) A customer sales order b) The cash forecast c) Aged accounts receivable information d) A receiving report 14. Which of the following is not an example of a source document? a) Receiving report b) Purchase order c) Sales order d) Aging report 15. Inputs to transaction processing systems: a) Are always in hard copy b) Are best when input in a graphical format c) May be in an electronic format when an EDI system is used d) May never be audio 16.Integrated accounting software programs generally include all of the following, except: a) Graphic reporting capabilities b) Internet connectivity c) One standardized chart of accounts d) The ability to handle multiple companies 17. Enterprise-wide AISs:
  • 26. a) Almost never pay for themselves b) Do not include many more features than middle-range accounting software packages c) Are seldom used by multinational organizations d) Integrate an organization’s financial functions with its other functional areas 18. Training and change management activities: a) Take place just before the go live stage of implementation b) Are most effective when conducted throughout design, go live, and post-implementation follow-up c) Include technical training only d) Do not include the design of user interfaces 19. Which of the following software packages is not an example of a middle-range AIS? a) Great Plains Dynamics b) MAS 90 c) SAP R/3 d) Solomon 20. Many organizations purchased new AISs during the 1990’s: a) Because of the need for Year 2000 compliance b) Because they wanted Internet connectivity c) In order to take advantage of opportunities for reengineering d) all of the above