SlideShare a Scribd company logo
ACC 340 Final Exam Guide New
To Purchase This Material Click below Link
http://www.acc340homework.com/product-26-ACC-340-Final-Exam-Guide-New
FOR MORE CLASSES VISIT
www.acc340homework.com
1. The essential steps in performing a systems study are (in order of occurrence): a)
Analysis, design, implementation and initial operation, follow up b) Design,
planning, follow up, analysis, and implementation c) Planning, system specification,
analysis, production, implementation d) Planning, analysis, design, implementation, and
follow up 2. Which of the following is intended to solve the problem that financial data
used in one application is not easily transferable to other applications? a) XMP b) ERP
c) XBRL d) XMLP 3. Information systems auditors are: a) Auditors who are
concerned with analyzing risks associated with computerized information systems b)
Individuals who often work closely with financial auditors c) Auditors who have a
lot of technical expertise related to information technology d) all of the above 4. Which
of the following is not an ability of client/server computing? a) Alter data stored
elsewhere on the network b) Process a transaction that may affect data stored on
both client and server computers c) Query or manipulate the warehoused data on
the server d) Increased networking capabilities between different file formats on multiple
systems 5. Software that enables businesses and government agencies to transmit and
manipulate financial data on an organization-wide basis best describes: a.
Communication software b. CAD software c. Enterprise resource
planning (ERP) software d.Programming software 6. All of the following are
programming languages except: a.Java b. HTML c. C++ d. COBOL e.
ERP 7. Data flow diagrams: a) Accomplish the same purpose as system
flowcharts b) Are different from system flowcharts since they focus on a logical view of
the information system c) Are useless for planning a new system d) Are never used in
analyzing an existing system 8. All of the following are controls for end-user computing
except: a) Formally evaluate large projects b) Formalize documentation
standards c) Limit the number of employees authorized to create end-user applications
d) all of the above are important controls 9. The textbook identified seven reasons
why documentation of an AIS is important. For which of the following reasons would the
user guides, procedure manuals and operating instructions be most important? a)
Depicting how the system works b) Training users c) Designing new
systems d) Standardizing communications with others 10. Business organizations are
recognizing the value of sales data and are purchasing software solutions to gather,
maintain, and use these data to provide better service and promote customer loyalty.
These software solutions are called: a) Customer relations data solutions b) Customer
relationship management solutions c) Sales data management solutions d) none of the
above 11. Which of the following statements best describes business process
outsourcing? a) A company focuses on its core business processes and contracts with
another firm to do the other processes b) Companies frequently outsource core business
processes c) Due to networked enterprises and advanced technology, more employees
may work from their homes or alternate locations d) Initially, companies engaged in
business process outsourcing to offer employees more opportunities to travel and more
career choices for advancement 12. Networked enterprises and globalization have
enabled a new business model called “business-without-boundaries.” Which of the
following statements describes this business model? a) Companies no longer have all of
their employees in one location b) It is called offshoring and companies contract with
firms in other countries to do such business processes as human resources, payroll, and
accounting c) Companies are under a great deal of scrutiny to manage costs and generate
revenue so they contract with foreign firms to do various business processes at a lower
cost to the company d) all of the above statements describe this model 13. Which of the
following is not a concern of the financing process? a) Effective cash management b)
Optimizing an organization’s cost of capital c) Minimizing an organization’s
borrowings d) Projecting cash flows 14. Business process reengineering efforts
sometimes fail because: a. Management gets too involved in the process b. Management
is too optimistic regarding its expectations from its implementation c. Management
support can never overcome employee resistance d. Employees will never accept
change 15. Which of the following technologies are now used in conjunction with
automated production process systems to increase efficiencies? a) Radio frequency
technology b)Bar code scanners c)RF IDs and advanced electronic tags d) all of the
above e) none of the above 16. According to the textbook, which of these statements
is most accurate? a) Most computer abuse is performed as retaliation against employers
b) Very little computer crime is committed for personal gain c) Some computer
abuse is performed simply to meet a challenge d) We catch most computer abusers
with good accounting controls 17.Which of the following is probably the primary reason
accountants should be concerned about computer crime and abuse? a) They might
lose their job if they don’t detect computer crime or abuse in their organization b) They
might lose their professional credibility and license if computer crime or abuse continues
for a long time in their organization and they do not detect it c) They are
responsible for designing, implementing, and monitoring the control procedures for AISs
d) none of the above 18.One of the major crimes identified by the Computer Fraud
and Abuse Act of 1986 is intent to illegally obtain information or tangible property
through the use of computers. Which of the following methods might accomplish this
type of crime if the perpetrator can change data before, during, or after they are entered
into a computer system? a) Salami technique b) Data diddling c) Shoulder surfing d)
Trojan horse program 19.Regarding a company's audit trail, which of the
following statements is true? a) Because of the complexities involved in establishing
an audit trail, a good audit trail normally makes it more difficult for an individual to
follow the flow of a company's business transactions through the company's information
system b) In actuality, the audit trail established within a company's information
system is an unimportant element of the company's internal control system c) When
a company's audit trail becomes more difficult to follow, this causes an increase in the
risk of errors or irregularities taking place in the processing of accounting transactions
and not being detected d) A company's policies and procedures manual should not be
part of its audit trail since confidential information is included within this manual
20.Which of the following statements is true regarding timely performance reports? a.
In many companies, these reports are the major means of providing information to
management concerning the actual operations of the companies’ internal control systems
b. These reports should only include monetary data c. Since these reports fail to
provide feedback to management on the operations of previously implemented internal
control procedures, other techniques are needed to provide this feedback to managers d.
The complexity that a computer introduces into a company's information system
will typically prevent the preparation of timely performance reports for the company's
management 21. _________________ describes the policies, plans, and procedures
implemented by a firm to protect its assets. a) Internal control b) SAS No. 94 c)
SOX, Section 404 d) Enterprise risk management 22. General controls
within IT environments that affect personnel include: a) Use of computer accounts
b) Separation of duties c) Informal knowledge of employees d) all of the
above affect personnel 23. Which of the following best describes a fundamental control
weakness often associated with automated data processing systems? a. Automated¬
data processing equipment is more subject to systems error than manual processing is
subject to human error b. Automated data processing equipment processes and records
similar transactions in a similar manner c. Automated data processing procedures
for detection of invalid and unusual transactions are less effective than manual control
procedures d. Functions that would normally be separated in a manual system are
combined in an automated data processing system 24. The textbook identifies a number
of issues that should be considered when developing a security policy. One of the issues
is “identify threats”. Which of the following is not an example of this issue? a) What
assets need to be protected b) What are the sources of potential security problems c)
External threats are viruses, worms, retaliations from former employees d) Internal
threats are misuse of assets by employees and embezzlement 25 Which of these is not a
phase in the life cycle of an information system? a) Planning b) Analysis c) Control d)
Implementation 26. A poorly-planned information system can result in: a) Employee
resistance and even sabotage b) Inflexible systems that are hard to maintain or modify
c) Systems that solve the wrong problems d) all of these 27. Which of the
following is not a general objective in the design of an information system? a) A
system should provide information which is timely and relevant for decision making by
management and operating personnel b) The output of a system should be highly
accurate c) A system should have sufficient capacity to accommodate levels of normal
activity; any additional capacity proves too costly in the long run d) A system should be
as simple as permitted so that its structure and operation can be easily understood and its
procedures easily accomplished e)A system should be flexible to accommodate changes
of a reasonable magnitude when required 28. A computerized AIS is harder to audit
than a manual system for all of the following reasons except: a) The file information
is not human readable b) The volume of transaction records and master file records is
usually much larger in computerized systems than in manual systems c) An audit trail
does not exist in a computerized AIS d) Computerized systems often use remote real-
time data processing, thus complicating the tracing of transaction records to their sources
29. Which of the following is not one of the groups of SOX compliance requirements? a)
requirements to use an IT auditor to evaluate controls b) regulations
governing executive reporting and conduct c) rules about financial statement reporting
d) audit committee/corporate governance requirements 30. Three common techniques
auditors use to test computer programs are: a) Test data, integrated test facilities, and
parallel simulation b) Test data, edit checks, and integrated test facilities c) Test
data, program change control, and parallel simulation d) Program change control,
edit checks, and parallel simulation 31. The term data encryption refers to: a)
Storing data in safe places called “crypts” b) Transforming data into secret
codes c) Scrambling data in random ways that cannot be unscrambled d) none
of these 32. The term key in the context of data encryption refers to: a) A physical
key similar to a house key b) A logical key similar to the primary key of a data file
c) A mathematical function used for encryption purposes d) A computer
function key that can be found on keyboards 33. All of the following are benefits of
XBRL except: a) Companies can file financial information in one format, avoiding the
errors that may come from reentering data multiple times b) The SEC accepts XBRL-
format for electronic filing of financial statement reports c) XBRL permits the
automatic and reliable exchange of financial information across all software formats and
technologies, including the Internet d) all of the above are benefits of XBRL e) none
of the above are benefits of XBRL 34. All of these are reasons why databases are
important to AISs except: a) AIS databases store valuable information b) Many
AISs are large and therefore potentially unwieldy c) The databases of some
organizations are very complex d) The hard disk space used to store AIS databases is
comparatively expensive e) all of these are reasons why databases are important to AISs
35. A major advantage of relational databases is: a) All records are stored together b)
No pointers are used c) An expandable index is used d) It closely
resembles a flat file 36. In recent years many businesses have formed a common
information source within their business organization called a database. One of the
advantages of building databases is the simultaneous updating of files with common data
elements. Another major advantage of the database concept is that: a) Database
systems can be used in microcomputers as well as on large computers b) Database
systems are simple to install and maintain c) Database systems are generally less
expensive than separate file maintenance systems d) Less duplication of data occurs
with a database system e) Fewer skilled people are required to run a database system
than any other system 37. The process of data normalization refers to: a) Eliminating
data errors and other problems from “normal data” b) Scaling data to values between zero
and one c) Storing data in normal storage media such as hard disks d) none of these
38. Database management systems are important to accountants because: a) They
automate file storage tasks and enable managers to generate worthwhile financial reports
b) They eliminate data redundancy c) They are unique data structures which
accountants have never used before d) They are easy to develop and therefore save
money e) They are energy efficient 39. Which of these is true about finding data
in multimedia databases? a) It is not possible to search them because graphics have
no text keys for searching b) It is not possible to search them because audio objects
have no text keys for searching c) It is possible to search for items in them because such
characteristics as “speaker” or “subject” can be used as search parameters d) It is
possible to search for items in them if the name of the embedded graphics or audio file is
also known
________________________________________________________________________
________
ACC 340 Week 5 Individual Assignment Final Exam
To Purchase This Material Click below Link
http://www.acc340homework.com/ACC-340-Week-5-Individual-Assignment-Final-
Exam
FOR MORE CLASSES VISIT
www.acc340homework.com
Multiple-Choice Questions
1. The process by which a financial transaction is recorded so that its flow through the
system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail
2. Justifying expenditures for new technologies is especially difficult because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital budgeting problem
3. The essential steps in performing a systems study are (in order of occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow up
4. What is the first step to be performed by most organizations in their accounting cycles?
a) Recording business transactions in a journal
b) Preparing a trial balance
c) Recording closing entries in a journal
d) Preparing transaction source documents
e) none of the above
5. Which systems study step is normally performed first?
a) Design
b) Initial operation
c) Follow up
d) Analysis
e) none of the above
6. The purpose of a company firewall is to:
a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above
7. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
8. An advantage of an extranet is that:
a) It can disseminate information corporate wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in them
d) all of the above
9. Another name for an Internet domain address is its:
a) URL
b) ISP
c) email address
d) IETF
10. Business process reengineering efforts sometimes fail because:
a) Management gets too involved in the process
b) Management is too optimistic regarding its expectations from its
implementation
c) Management support can never overcome employee resistance
d) Employees will never accept change
11. The sales process begins with:
a) Placing an order with a vendor
b) A customer order for goods or services
c) Production of goods or services
d) Delivery of goods or services
12. The primary objective in processing revenues is to:
a) Sell as many goods as possible
b) Achieve timely and efficient cash collection
c) Maximize an organization’s sales orders
d) Only sell goods to customers who can pay their bills
13. An important input to the sales process is:
a) A customer sales order
b) The cash forecast
c) Aged accounts receivable information
d) A receiving report
14. Which of the following is not an example of a source document?
a) Receiving report
b) Purchase order
c) Sales order
d) Aging report
15. Inputs to transaction processing systems:
a) Are always in hard copy
b) Are best when input in a graphical format
c) May be in an electronic format when an EDI system is used
d) May never be audio
16.Integrated accounting software programs generally include all of the following,
except:
a) Graphic reporting capabilities
b) Internet connectivity
c) One standardized chart of accounts
d) The ability to handle multiple companies
17. Enterprise-wide AISs:
a) Almost never pay for themselves
b) Do not include many more features than middle-range accounting software packages
c) Are seldom used by multinational organizations
d) Integrate an organization’s financial functions with its other functional areas
18. Training and change management activities:
a) Take place just before the go live stage of implementation
b) Are most effective when conducted throughout design, go live, and post-
implementation follow-up
c) Include technical training only
d) Do not include the design of user interfaces
19. Which of the following software packages is not an example of a middle-range AIS?
a) Great Plains Dynamics
b) MAS 90
c) SAP R/3
d) Solomon
20. Many organizations purchased new AISs during the 1990’s:
a) Because of the need for Year 2000 compliance
b) Because they wanted Internet connectivity
c) In order to take advantage of opportunities for reengineering
d) all of the above

More Related Content

What's hot

A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
Marcirio Chaves
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
rhettwhitee
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
olivergeorg
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
Sreekanth Narendran
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
Cristina Villavicencio
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
Kashif Rana ACCA
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
alicalland
 
Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)
Mannilou Pascua
 

What's hot (8)

A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
A Look at Risks in IT Projects: A Case Study during the Merger Period in the ...
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
 
Uop acc 544 week 6 quiz
Uop acc 544 week 6 quizUop acc 544 week 6 quiz
Uop acc 544 week 6 quiz
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)Cmsc411(Pascuappt Report)
Cmsc411(Pascuappt Report)
 

Similar to Acc 340 final exam guide

Acc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.comAcc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.com
robertleew
 
Test
TestTest
Sample
SampleSample
ACC 340 Education Organization / snaptutorial.com
ACC 340  Education Organization / snaptutorial.comACC 340  Education Organization / snaptutorial.com
ACC 340 Education Organization / snaptutorial.com
donaldzs170
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
sarahlazeto
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
LillieDickey
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
Sarajacobe
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
MariaLouis2018
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
EmmaJack2018
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
emmywatson2017
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
sweetsour2017
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
KatherineJack1
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
lizabonilla
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
elizabethbrown2018
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.com
beautifuljasmine
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
MaryTurner2017
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
mariajackson2018
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
MaryLouis2018
 
1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx
fredellsberry
 
Test
TestTest

Similar to Acc 340 final exam guide (20)

Acc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.comAcc 340 Enhance teaching-snaptutorial.com
Acc 340 Enhance teaching-snaptutorial.com
 
Test
TestTest
Test
 
Sample
SampleSample
Sample
 
ACC 340 Education Organization / snaptutorial.com
ACC 340  Education Organization / snaptutorial.comACC 340  Education Organization / snaptutorial.com
ACC 340 Education Organization / snaptutorial.com
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
Bus 365 week 11 quiz
Bus 365 week 11 quizBus 365 week 11 quiz
Bus 365 week 11 quiz
 
ACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.comACC 340 Extraordinary Success |snaptutorial.com
ACC 340 Extraordinary Success |snaptutorial.com
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
Bus 365 week 10 quiz
Bus 365 week 10 quizBus 365 week 10 quiz
Bus 365 week 10 quiz
 
1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx1.The S” in the acronym AIS” stands forA)StandardB).docx
1.The S” in the acronym AIS” stands forA)StandardB).docx
 
Test
TestTest
Test
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

Acc 340 final exam guide

  • 1. ACC 340 Final Exam Guide New To Purchase This Material Click below Link http://www.acc340homework.com/product-26-ACC-340-Final-Exam-Guide-New FOR MORE CLASSES VISIT www.acc340homework.com 1. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning, analysis, design, implementation, and follow up 2. Which of the following is intended to solve the problem that financial data used in one application is not easily transferable to other applications? a) XMP b) ERP c) XBRL d) XMLP 3. Information systems auditors are: a) Auditors who are concerned with analyzing risks associated with computerized information systems b) Individuals who often work closely with financial auditors c) Auditors who have a lot of technical expertise related to information technology d) all of the above 4. Which of the following is not an ability of client/server computing? a) Alter data stored elsewhere on the network b) Process a transaction that may affect data stored on both client and server computers c) Query or manipulate the warehoused data on the server d) Increased networking capabilities between different file formats on multiple systems 5. Software that enables businesses and government agencies to transmit and manipulate financial data on an organization-wide basis best describes: a. Communication software b. CAD software c. Enterprise resource planning (ERP) software d.Programming software 6. All of the following are programming languages except: a.Java b. HTML c. C++ d. COBOL e. ERP 7. Data flow diagrams: a) Accomplish the same purpose as system flowcharts b) Are different from system flowcharts since they focus on a logical view of the information system c) Are useless for planning a new system d) Are never used in analyzing an existing system 8. All of the following are controls for end-user computing except: a) Formally evaluate large projects b) Formalize documentation standards c) Limit the number of employees authorized to create end-user applications d) all of the above are important controls 9. The textbook identified seven reasons why documentation of an AIS is important. For which of the following reasons would the user guides, procedure manuals and operating instructions be most important? a) Depicting how the system works b) Training users c) Designing new
  • 2. systems d) Standardizing communications with others 10. Business organizations are recognizing the value of sales data and are purchasing software solutions to gather, maintain, and use these data to provide better service and promote customer loyalty. These software solutions are called: a) Customer relations data solutions b) Customer relationship management solutions c) Sales data management solutions d) none of the above 11. Which of the following statements best describes business process outsourcing? a) A company focuses on its core business processes and contracts with another firm to do the other processes b) Companies frequently outsource core business processes c) Due to networked enterprises and advanced technology, more employees may work from their homes or alternate locations d) Initially, companies engaged in business process outsourcing to offer employees more opportunities to travel and more career choices for advancement 12. Networked enterprises and globalization have enabled a new business model called “business-without-boundaries.” Which of the following statements describes this business model? a) Companies no longer have all of their employees in one location b) It is called offshoring and companies contract with firms in other countries to do such business processes as human resources, payroll, and accounting c) Companies are under a great deal of scrutiny to manage costs and generate revenue so they contract with foreign firms to do various business processes at a lower cost to the company d) all of the above statements describe this model 13. Which of the following is not a concern of the financing process? a) Effective cash management b) Optimizing an organization’s cost of capital c) Minimizing an organization’s borrowings d) Projecting cash flows 14. Business process reengineering efforts sometimes fail because: a. Management gets too involved in the process b. Management is too optimistic regarding its expectations from its implementation c. Management support can never overcome employee resistance d. Employees will never accept change 15. Which of the following technologies are now used in conjunction with automated production process systems to increase efficiencies? a) Radio frequency technology b)Bar code scanners c)RF IDs and advanced electronic tags d) all of the above e) none of the above 16. According to the textbook, which of these statements is most accurate? a) Most computer abuse is performed as retaliation against employers b) Very little computer crime is committed for personal gain c) Some computer abuse is performed simply to meet a challenge d) We catch most computer abusers with good accounting controls 17.Which of the following is probably the primary reason accountants should be concerned about computer crime and abuse? a) They might lose their job if they don’t detect computer crime or abuse in their organization b) They might lose their professional credibility and license if computer crime or abuse continues for a long time in their organization and they do not detect it c) They are
  • 3. responsible for designing, implementing, and monitoring the control procedures for AISs d) none of the above 18.One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system? a) Salami technique b) Data diddling c) Shoulder surfing d) Trojan horse program 19.Regarding a company's audit trail, which of the following statements is true? a) Because of the complexities involved in establishing an audit trail, a good audit trail normally makes it more difficult for an individual to follow the flow of a company's business transactions through the company's information system b) In actuality, the audit trail established within a company's information system is an unimportant element of the company's internal control system c) When a company's audit trail becomes more difficult to follow, this causes an increase in the risk of errors or irregularities taking place in the processing of accounting transactions and not being detected d) A company's policies and procedures manual should not be part of its audit trail since confidential information is included within this manual 20.Which of the following statements is true regarding timely performance reports? a. In many companies, these reports are the major means of providing information to management concerning the actual operations of the companies’ internal control systems b. These reports should only include monetary data c. Since these reports fail to provide feedback to management on the operations of previously implemented internal control procedures, other techniques are needed to provide this feedback to managers d. The complexity that a computer introduces into a company's information system will typically prevent the preparation of timely performance reports for the company's management 21. _________________ describes the policies, plans, and procedures implemented by a firm to protect its assets. a) Internal control b) SAS No. 94 c) SOX, Section 404 d) Enterprise risk management 22. General controls within IT environments that affect personnel include: a) Use of computer accounts b) Separation of duties c) Informal knowledge of employees d) all of the above affect personnel 23. Which of the following best describes a fundamental control weakness often associated with automated data processing systems? a. Automated¬ data processing equipment is more subject to systems error than manual processing is subject to human error b. Automated data processing equipment processes and records similar transactions in a similar manner c. Automated data processing procedures for detection of invalid and unusual transactions are less effective than manual control procedures d. Functions that would normally be separated in a manual system are combined in an automated data processing system 24. The textbook identifies a number
  • 4. of issues that should be considered when developing a security policy. One of the issues is “identify threats”. Which of the following is not an example of this issue? a) What assets need to be protected b) What are the sources of potential security problems c) External threats are viruses, worms, retaliations from former employees d) Internal threats are misuse of assets by employees and embezzlement 25 Which of these is not a phase in the life cycle of an information system? a) Planning b) Analysis c) Control d) Implementation 26. A poorly-planned information system can result in: a) Employee resistance and even sabotage b) Inflexible systems that are hard to maintain or modify c) Systems that solve the wrong problems d) all of these 27. Which of the following is not a general objective in the design of an information system? a) A system should provide information which is timely and relevant for decision making by management and operating personnel b) The output of a system should be highly accurate c) A system should have sufficient capacity to accommodate levels of normal activity; any additional capacity proves too costly in the long run d) A system should be as simple as permitted so that its structure and operation can be easily understood and its procedures easily accomplished e)A system should be flexible to accommodate changes of a reasonable magnitude when required 28. A computerized AIS is harder to audit than a manual system for all of the following reasons except: a) The file information is not human readable b) The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems c) An audit trail does not exist in a computerized AIS d) Computerized systems often use remote real- time data processing, thus complicating the tracing of transaction records to their sources 29. Which of the following is not one of the groups of SOX compliance requirements? a) requirements to use an IT auditor to evaluate controls b) regulations governing executive reporting and conduct c) rules about financial statement reporting d) audit committee/corporate governance requirements 30. Three common techniques auditors use to test computer programs are: a) Test data, integrated test facilities, and parallel simulation b) Test data, edit checks, and integrated test facilities c) Test data, program change control, and parallel simulation d) Program change control, edit checks, and parallel simulation 31. The term data encryption refers to: a) Storing data in safe places called “crypts” b) Transforming data into secret codes c) Scrambling data in random ways that cannot be unscrambled d) none of these 32. The term key in the context of data encryption refers to: a) A physical key similar to a house key b) A logical key similar to the primary key of a data file c) A mathematical function used for encryption purposes d) A computer function key that can be found on keyboards 33. All of the following are benefits of XBRL except: a) Companies can file financial information in one format, avoiding the
  • 5. errors that may come from reentering data multiple times b) The SEC accepts XBRL- format for electronic filing of financial statement reports c) XBRL permits the automatic and reliable exchange of financial information across all software formats and technologies, including the Internet d) all of the above are benefits of XBRL e) none of the above are benefits of XBRL 34. All of these are reasons why databases are important to AISs except: a) AIS databases store valuable information b) Many AISs are large and therefore potentially unwieldy c) The databases of some organizations are very complex d) The hard disk space used to store AIS databases is comparatively expensive e) all of these are reasons why databases are important to AISs 35. A major advantage of relational databases is: a) All records are stored together b) No pointers are used c) An expandable index is used d) It closely resembles a flat file 36. In recent years many businesses have formed a common information source within their business organization called a database. One of the advantages of building databases is the simultaneous updating of files with common data elements. Another major advantage of the database concept is that: a) Database systems can be used in microcomputers as well as on large computers b) Database systems are simple to install and maintain c) Database systems are generally less expensive than separate file maintenance systems d) Less duplication of data occurs with a database system e) Fewer skilled people are required to run a database system than any other system 37. The process of data normalization refers to: a) Eliminating data errors and other problems from “normal data” b) Scaling data to values between zero and one c) Storing data in normal storage media such as hard disks d) none of these 38. Database management systems are important to accountants because: a) They automate file storage tasks and enable managers to generate worthwhile financial reports b) They eliminate data redundancy c) They are unique data structures which accountants have never used before d) They are easy to develop and therefore save money e) They are energy efficient 39. Which of these is true about finding data in multimedia databases? a) It is not possible to search them because graphics have no text keys for searching b) It is not possible to search them because audio objects have no text keys for searching c) It is possible to search for items in them because such characteristics as “speaker” or “subject” can be used as search parameters d) It is possible to search for items in them if the name of the embedded graphics or audio file is also known ________________________________________________________________________ ________
  • 6. ACC 340 Week 5 Individual Assignment Final Exam To Purchase This Material Click below Link http://www.acc340homework.com/ACC-340-Week-5-Individual-Assignment-Final- Exam FOR MORE CLASSES VISIT www.acc340homework.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often recurring and are difficult to estimate c) Many benefits are intangible and are not easily known or measured d) Justifying a new technology is no different from any other capital budgeting problem 3. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation
  • 7. d) Planning, analysis, design, implementation, and follow up 4. What is the first step to be performed by most organizations in their accounting cycles? a) Recording business transactions in a journal b) Preparing a trial balance c) Recording closing entries in a journal d) Preparing transaction source documents e) none of the above 5. Which systems study step is normally performed first? a) Design b) Initial operation c) Follow up d) Analysis e) none of the above 6. The purpose of a company firewall is to: a) Guard against spoofing b) Assist the IETF c) Deny computer hackers access to sensitive data d) all of the above 7. The term data encryption refers to: a) Storing data in safe places called “crypts”
  • 8. b) Transforming data into secret codes c) Scrambling data in random ways that cannot be unscrambled d) none of these 8. An advantage of an extranet is that: a) It can disseminate information corporate wide b) It can be accessed by selected trading partners c) Users can employ common web browsers to access information in them d) all of the above 9. Another name for an Internet domain address is its: a) URL b) ISP c) email address d) IETF 10. Business process reengineering efforts sometimes fail because: a) Management gets too involved in the process b) Management is too optimistic regarding its expectations from its implementation c) Management support can never overcome employee resistance d) Employees will never accept change 11. The sales process begins with:
  • 9. a) Placing an order with a vendor b) A customer order for goods or services c) Production of goods or services d) Delivery of goods or services 12. The primary objective in processing revenues is to: a) Sell as many goods as possible b) Achieve timely and efficient cash collection c) Maximize an organization’s sales orders d) Only sell goods to customers who can pay their bills 13. An important input to the sales process is: a) A customer sales order b) The cash forecast c) Aged accounts receivable information d) A receiving report 14. Which of the following is not an example of a source document? a) Receiving report b) Purchase order c) Sales order d) Aging report 15. Inputs to transaction processing systems:
  • 10. a) Are always in hard copy b) Are best when input in a graphical format c) May be in an electronic format when an EDI system is used d) May never be audio 16.Integrated accounting software programs generally include all of the following, except: a) Graphic reporting capabilities b) Internet connectivity c) One standardized chart of accounts d) The ability to handle multiple companies 17. Enterprise-wide AISs: a) Almost never pay for themselves b) Do not include many more features than middle-range accounting software packages c) Are seldom used by multinational organizations d) Integrate an organization’s financial functions with its other functional areas 18. Training and change management activities: a) Take place just before the go live stage of implementation b) Are most effective when conducted throughout design, go live, and post- implementation follow-up c) Include technical training only d) Do not include the design of user interfaces
  • 11. 19. Which of the following software packages is not an example of a middle-range AIS? a) Great Plains Dynamics b) MAS 90 c) SAP R/3 d) Solomon 20. Many organizations purchased new AISs during the 1990’s: a) Because of the need for Year 2000 compliance b) Because they wanted Internet connectivity c) In order to take advantage of opportunities for reengineering d) all of the above