SlideShare a Scribd company logo
1 of 19
Download to read offline
ACC 564 Final Exam Part 1
To Purchase This Material Click below Link
http://www.acc564nerd.com/ACC-564-Final-Exam-Part-1
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Final Exam Part 1
Course Accounting Info Systems
Question 1 .
An accounting information system (AIS) processes ________ to provide users with
________.
. Question 2 .
Paid time-off policies, job descriptions, and procedures manuals are examples of
information needed to support key decisions in what business process?
. Question 3 .
Which of the following is a primary activity in the value chain?
. Question 4 .
A change in the AIS that makes information more easily accessible and widely
available within an organization is most likely to first influence the
. Question 5 .
A frantic StroFrinzel called the home office from Des Moines. "You have got to
help me. I am about to close a great sale, but I have to be able to guarantee delivery
by the fourteenth. I can't get through to the company Web site to verify delivery!"
"Thank you for calling. Your call is very important to us. However, all of our lines
are currently in use. Please try again later." Which of the following characteristics
of useful information is absent in the situation described above?
. Question 6 .
The coding technique most likely used for sales orders is called a
. Question 7 .
The quality assurance department at a large manufacturing business enters data
into the AIS that is used to produce a weekly report that summarizes the proportion
of defective units in each product line. This is an example of
Question 8 .
A specialized journal
. Question 9 .
Data must be collected about three facets of each business activity. What are they?
. Question 10 .
A specialized journal would be most likely to be used to enter
. Question 11 .
The Union Soup Kitchen is a non-profit organization that collects, stores, prepares
and provides food to the homeless in Erie, Pennsylvania. Donations of food are
recorded in a database and a receipt is provided to the donor. When food is used,
the database is updated so that it always reflects the amounts and types of food that
are available. In a data flow diagram, which type of symbol would be used to
represent the flow of data from the donor into the system?
. Question 12 .
A flowchart that depicts the relationships among the input, processing, and output
of an AIS is
. Question 13 .
In a data flow diagram of the customer payment process, "Customer payment" will
appear above or in
. Question 14 .
In general, a data destination will be shown by
. Question 15 .
In preparing a DFD, when data are transformed through a process, the symbol
used should be
. Question 16 .
When the human resources manager wants to gather data about vacation and
personal day usage by employees and by departments, the manager would use
which language?
. Question 17 .
The potential inconsistency that could occur when there are multiple occurrences of
a specific data item in a database is called the
. Question 18 .
The schema that provides an organization-wide view of the entire database is
known as the
. Question 19 .
The database requirement that foreign keys must be null or have a value
corresponding to the value of a primary key in another table is formally called the
. Question 20 .
In a relational database, requiring that every record in a table have a unique
identifier is called the
. Question 21 .
Which of the following is an opportunity that could contribute to employee fraud?
. Question 22 .
Which of the following is the greatest risk to information systems and causes the
greatest dollar losses?
. Question 23 .
One fraudulent scheme covers up a theft by creating cash through the transfer of
money between banks. This is known as
. Question 24 .
Most frauds are detected by
. Question 25 .
The most efficient way to conceal asset misappropriation is to
. Question 26 .
A fraud technique that slices off tiny amounts from many projects is called the
________ technique.
. Question 27 .
Computer fraud perpetrators that modify programs during systems development,
allowing access into the system that bypasses normal system controls are using
. Question 28 .
A fraud technique that allows a perpetrator to bypass normal system controls and
enter a secured system is called
. Question 29 .
Computer fraud perpetrators who use telephone lines to commit fraud and other
illegal acts are typically called
. Question 30 .
A ________ is similar to a ________, except that it is a program rather than a code
segment hidden in a host program.
. Question 31 .
________ controls prevent, detect and correct transaction errors and fraud.
. Question 32 .
According to the ERM, these objectives help ensure the accuracy, completeness and
reliability of internal and external company reports.
. Question 33 .
Generally in a risk assessment process, the first step is to
. Question 34 .
The process that a business uses to safeguard assets, provide accurate and reliable
information, and promote and improve operational efficiency is known as
. Question 35 .
According to the ERM, these help the company address all applicable laws and
regulations.
. Question 36 .
Which of the following is an example of a corrective control?
. Question 37 .
The process of turning off unnecessary features in the system is known as
. Question 38 .
The process that screens individual IP packets based solely on the contents of the
source and/or destination fields in the packet header is known as
. Question 39 .
According to the Trust Services Framework, the reliability principle of integrity is
achieved when the system produces data that
. Question 40 .
Compatibility tests utilize a(n) ________, which is a list of authorized users,
programs, and data files the users are authorized to access or manipulate.
. Question 41 .
Which of the following is not one of the three important factors determining the
strength of any encryption system?
. Question 42 .
Which of the following descriptions is not associated with symmetric encryption?
. Question 43 .
An electronic document that certifies the identity of the owner of a particular public
key.
. Question 44 .
Which of the following is not one of the 10 internationally recognized best practices
for protecting the privacy of customers' personal information?
. Question 45 .
These are used to create digital signatures.
. Question 46 .
This determines the correctness of the logical relationship between two data items.
. Question 47 .
This determines if characters are of the proper type.
. Question 48 .
Check digit verification is an example of a(n)
. Question 49 .
This batch processing data entry control sums a non-financial numeric field.
. Question 50 .
What is the most effective way to ensure information system availability?
________________________________________________________________________
__________
ACC 564 Final Exam Part 2
To Purchase This Material Click below Link
http://www.acc564nerd.com/ACC-564-Final-Exam-Part-2
FOR MORE CLASSES VISIT
www.acc564nerd.com
ACC 564 Final Exam Part 2
Question 1
In the ________ stage of an operational audit, the auditor measures the actual system
against an ideal standard.
Question 2
An auditor finds that employee absentee rates are significantly higher on Mondays and
Fridays than on other work days. This is an example collecting audit evidence by
Question 3
The ________ to auditing provides auditors with a clear understanding of possible errors
and irregularities and the related risks and exposures.
Question 4
According to the risk-based auditing approach, when a control deficiency is identified,
the auditor should inquire about
Question 5
Control risk is defined as the
Question 6
During the sales order entry process, a ________ is performed to verify that each
transaction record contains all appropriate data items.
Question 7
The shipping department at Squishy Things Toy Company follows policies that
determine which carrier will deliver orders according to the size, weight, and destination
of the shipment. It maintains standing agreements with shippers that specify legal
responsibility for the shipment while it is in transit. The terms of the agreements are
documented on
Question 8
When an ERP is used, it is assumed that there will be increases in efficiency and the
effectiveness of the activities related to the revenue cycle. However, what must be in
place and functioning well to fully realize these benefits?
Question 9
Which of the following documents would normally trigger the process to record a
customer payment?
Question 10
A type of business document in which part of the original document is returned to the
source for further processing is called a ________ document.
Question 11
Duties in the expenditure cycle should be properly segregated to promote internal control.
This means that the authorization function is performed by ________, the recording
function is performed by ________, and cash handling is performed by the ________.
Question 12
Procurement cards differ from corporate credit cards in which of the following ways?
Question 13
What control should be put in place that assigns responsibility for EFT payments made to
vendors?
Question 14
Economic Order Quantity (EOQ) includes several variables that must be taken into
consideration when calculating the optimal order size. One variable, the costs associated
with holding inventory, is referred to as
Question 15
The traditional approach to inventory management to ensure sufficient quantity on hand
to maintain production is known as
Question 16
When using electronic documents, ________ increase the accuracy of data entry.
Question 17
Which department should have the sole ability to provide information to the AIS about
hiring, terminations, and pay rate changes?
Question 18
The document that lists each employee's gross pay, payroll deductions, and net pay in a
multicolumn format is called
Question 19
Companies that specialize in processing payroll are known as
Question 20
Which of the following will limit a firm's potential loss exposure from paycheck forgery?
Question 21
Recording interest earned on an investment is an example of which type of adjusting
journal entry?
Question 22
Departments that mostly provide services to other units and charge those units for
services rendered should be evaluated as ________ centers.
Question 23
Cheryl Liao is an accountant at Folding Squid Technologies. While making an adjusting
entry to the general ledger, she received the following error message, "Your journal entry
must be a numeric value. Please reenter." This message was the result of a
Question 24
Budgets and performance reports should be developed on the basis of
Question 25
An adjusting entry made at the end of an accounting period that reflects the exchange of
cash prior to performance of a related event is classified as a(n)
Question 26
Each event in an REA model will in most cases have at least one ________ agent and one
________ agent involved with the event.
Question 27
The REA data model
Question 28
Which of the following transactions is represented by the diagram below?
Question 29
An entity-relationship (E-R) diagram
Question 30
Relationships that affect the quantity of a resource are sometimes referred to as ________
relationships.
Question 31
Refer to the table below, which shows the results of payback, net present value, and
internal rate of return analysis of four projects. Which is preferred by the net present
value criterion?
Question 32
When using the payback method to determine economic feasibility of projects, the
company usually accepts the project with the
Question 33
Who is responsible for preparing the specifications that are used to create the programs?
Question 34
Refer to the table below, which shows the results of payback, net present value, and
internal rate of return analysis of four projects. Which is preferred by the payback
criterion?
Question 35
The capital budgeting technique where estimated future cash flows are discounted back to
the present is referred to as
Question 36
When canned software is used for systems acquisition, the maintenance aspect of the
operations and maintenance phase of the SDLC
Question 37
BenathirDonathat, director of the project committee, has received approval from
management for implementation of a new accounting information system. After putting
out an RFP, the committee settled on a vendor that will provide an industry standard
software package and post-sale technical support. The committee decided to go with
Question 38
The ________ method calculates and compares the processing times of different AIS to
compare system performance.
Question 39
End-user computing is likely to result in a(n)
Question 40
What would be one duty of second-line help desk personnel?
Question 41
One process used to uncover and eliminate program errors is known as
Question 42
Who is responsible for identifying such risk factors in an implementation plan?
Question 43
Which of the following describes a phase-in conversion?
Question 44
Phil in Marketing got a call from Chuck in ITS. "Phil, the system just generated a stock-
out report. I wanted to give you a heads up. I'm sending it right over." This is an example
of a
Question 45
Chuck in ITS got a call from Phil in Marketing. "Chuck, I need you to do something for
me. Query sales data for the first quarter and pull out all of the invoices that include the
snow blower discount. I need a count and the total amount of the discount. Thanks." This
is an example of a
+______________________________________________________________________
__________

More Related Content

What's hot

Customer Contact DB Development Project
Customer Contact DB Development ProjectCustomer Contact DB Development Project
Customer Contact DB Development Project
Nicholai Stevens
 
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
Waqas Tariq
 

What's hot (14)

ACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.comACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.com
 
Acc 564 Enhance teaching / snaptutorial.com
Acc 564  Enhance teaching / snaptutorial.comAcc 564  Enhance teaching / snaptutorial.com
Acc 564 Enhance teaching / snaptutorial.com
 
Prediction of Corporate Bankruptcy using Machine Learning Techniques
Prediction of Corporate Bankruptcy using Machine Learning Techniques Prediction of Corporate Bankruptcy using Machine Learning Techniques
Prediction of Corporate Bankruptcy using Machine Learning Techniques
 
Enterprise software testing
Enterprise software testingEnterprise software testing
Enterprise software testing
 
Enterprise Software Architecture Project
Enterprise Software Architecture ProjectEnterprise Software Architecture Project
Enterprise Software Architecture Project
 
564 complete class
 564 complete class 564 complete class
564 complete class
 
E-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perceptionE-commerce online review for detecting influencing factors users perception
E-commerce online review for detecting influencing factors users perception
 
Customer Contact DB Development Project
Customer Contact DB Development ProjectCustomer Contact DB Development Project
Customer Contact DB Development Project
 
Corporate bankruptcy prediction using Deep learning techniques
Corporate bankruptcy prediction using Deep learning techniquesCorporate bankruptcy prediction using Deep learning techniques
Corporate bankruptcy prediction using Deep learning techniques
 
Determination of Favorite E-Commerce in Indonesia in a Decision Support Syste...
Determination of Favorite E-Commerce in Indonesia in a Decision Support Syste...Determination of Favorite E-Commerce in Indonesia in a Decision Support Syste...
Determination of Favorite E-Commerce in Indonesia in a Decision Support Syste...
 
Evaluation of Outputs of Automated AIS for Decision Making: A Study on Commer...
Evaluation of Outputs of Automated AIS for Decision Making: A Study on Commer...Evaluation of Outputs of Automated AIS for Decision Making: A Study on Commer...
Evaluation of Outputs of Automated AIS for Decision Making: A Study on Commer...
 
IRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score IndexingIRJET - Bankruptcy Score Indexing
IRJET - Bankruptcy Score Indexing
 
Business information system assignment
Business information system assignmentBusiness information system assignment
Business information system assignment
 
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
Propose a Model for Customer Purchase Decision in B2C Websites Using Adaptive...
 

Similar to ACC 564 Final Exam

Building Information System
Building Information SystemBuilding Information System
Building Information System
Rabia Jabeen
 

Similar to ACC 564 Final Exam (20)

ACC 564 Final Exam
ACC 564 Final ExamACC 564 Final Exam
ACC 564 Final Exam
 
Acc 564 final exam part 2
Acc 564 final exam part 2Acc 564 final exam part 2
Acc 564 final exam part 2
 
ACC 542 Expect Success/newtonhelp.com
ACC 542 Expect Success/newtonhelp.comACC 542 Expect Success/newtonhelp.com
ACC 542 Expect Success/newtonhelp.com
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016Acc 564 final exam part 1 new spring 2016
Acc 564 final exam part 1 new spring 2016
 
Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016
 
Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016
 
Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016
 
Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016Acc 564 final exam part 2 new spring 2016
Acc 564 final exam part 2 new spring 2016
 
Hsa 315 Massive Success / snaptutorial.com
Hsa 315 Massive Success / snaptutorial.comHsa 315 Massive Success / snaptutorial.com
Hsa 315 Massive Success / snaptutorial.com
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Strayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 newStrayer cis 333 week 11 final exam set 3 new
Strayer cis 333 week 11 final exam set 3 new
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systems
 
Acc 564 entire course accounting information systems
Acc 564 entire course accounting information systemsAcc 564 entire course accounting information systems
Acc 564 entire course accounting information systems
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)
 
Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)Cis 333 final exam (3 sets)
Cis 333 final exam (3 sets)
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Recently uploaded (20)

UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

ACC 564 Final Exam

  • 1. ACC 564 Final Exam Part 1 To Purchase This Material Click below Link http://www.acc564nerd.com/ACC-564-Final-Exam-Part-1 FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Final Exam Part 1 Course Accounting Info Systems Question 1 . An accounting information system (AIS) processes ________ to provide users with ________. . Question 2 . Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process? . Question 3 . Which of the following is a primary activity in the value chain? . Question 4 .
  • 2. A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the . Question 5 . A frantic StroFrinzel called the home office from Des Moines. "You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can't get through to the company Web site to verify delivery!" "Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later." Which of the following characteristics of useful information is absent in the situation described above? . Question 6 . The coding technique most likely used for sales orders is called a . Question 7 . The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of Question 8 . A specialized journal
  • 3. . Question 9 . Data must be collected about three facets of each business activity. What are they? . Question 10 . A specialized journal would be most likely to be used to enter . Question 11 . The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the flow of data from the donor into the system? . Question 12 . A flowchart that depicts the relationships among the input, processing, and output of an AIS is . Question 13 . In a data flow diagram of the customer payment process, "Customer payment" will appear above or in
  • 4. . Question 14 . In general, a data destination will be shown by . Question 15 . In preparing a DFD, when data are transformed through a process, the symbol used should be . Question 16 . When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language? . Question 17 . The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the . Question 18 .
  • 5. The schema that provides an organization-wide view of the entire database is known as the . Question 19 . The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the . Question 20 . In a relational database, requiring that every record in a table have a unique identifier is called the . Question 21 . Which of the following is an opportunity that could contribute to employee fraud? . Question 22 . Which of the following is the greatest risk to information systems and causes the greatest dollar losses? . Question 23 . One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
  • 6. . Question 24 . Most frauds are detected by . Question 25 . The most efficient way to conceal asset misappropriation is to . Question 26 . A fraud technique that slices off tiny amounts from many projects is called the ________ technique. . Question 27 . Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using . Question 28 . A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called . Question 29 .
  • 7. Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called . Question 30 . A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. . Question 31 . ________ controls prevent, detect and correct transaction errors and fraud. . Question 32 . According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. . Question 33 . Generally in a risk assessment process, the first step is to . Question 34 .
  • 8. The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as . Question 35 . According to the ERM, these help the company address all applicable laws and regulations. . Question 36 . Which of the following is an example of a corrective control? . Question 37 . The process of turning off unnecessary features in the system is known as . Question 38 . The process that screens individual IP packets based solely on the contents of the source and/or destination fields in the packet header is known as . Question 39 . According to the Trust Services Framework, the reliability principle of integrity is achieved when the system produces data that
  • 9. . Question 40 . Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate. . Question 41 . Which of the following is not one of the three important factors determining the strength of any encryption system? . Question 42 . Which of the following descriptions is not associated with symmetric encryption? . Question 43 . An electronic document that certifies the identity of the owner of a particular public key. . Question 44 . Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?
  • 10. . Question 45 . These are used to create digital signatures. . Question 46 . This determines the correctness of the logical relationship between two data items. . Question 47 . This determines if characters are of the proper type. . Question 48 . Check digit verification is an example of a(n) . Question 49 . This batch processing data entry control sums a non-financial numeric field. . Question 50 . What is the most effective way to ensure information system availability?
  • 11. ________________________________________________________________________ __________ ACC 564 Final Exam Part 2 To Purchase This Material Click below Link http://www.acc564nerd.com/ACC-564-Final-Exam-Part-2 FOR MORE CLASSES VISIT www.acc564nerd.com ACC 564 Final Exam Part 2 Question 1 In the ________ stage of an operational audit, the auditor measures the actual system against an ideal standard. Question 2 An auditor finds that employee absentee rates are significantly higher on Mondays and Fridays than on other work days. This is an example collecting audit evidence by Question 3 The ________ to auditing provides auditors with a clear understanding of possible errors and irregularities and the related risks and exposures. Question 4
  • 12. According to the risk-based auditing approach, when a control deficiency is identified, the auditor should inquire about Question 5 Control risk is defined as the Question 6 During the sales order entry process, a ________ is performed to verify that each transaction record contains all appropriate data items. Question 7 The shipping department at Squishy Things Toy Company follows policies that determine which carrier will deliver orders according to the size, weight, and destination of the shipment. It maintains standing agreements with shippers that specify legal responsibility for the shipment while it is in transit. The terms of the agreements are documented on Question 8 When an ERP is used, it is assumed that there will be increases in efficiency and the effectiveness of the activities related to the revenue cycle. However, what must be in place and functioning well to fully realize these benefits?
  • 13. Question 9 Which of the following documents would normally trigger the process to record a customer payment? Question 10 A type of business document in which part of the original document is returned to the source for further processing is called a ________ document. Question 11 Duties in the expenditure cycle should be properly segregated to promote internal control. This means that the authorization function is performed by ________, the recording function is performed by ________, and cash handling is performed by the ________. Question 12 Procurement cards differ from corporate credit cards in which of the following ways? Question 13 What control should be put in place that assigns responsibility for EFT payments made to vendors? Question 14
  • 14. Economic Order Quantity (EOQ) includes several variables that must be taken into consideration when calculating the optimal order size. One variable, the costs associated with holding inventory, is referred to as Question 15 The traditional approach to inventory management to ensure sufficient quantity on hand to maintain production is known as Question 16 When using electronic documents, ________ increase the accuracy of data entry. Question 17 Which department should have the sole ability to provide information to the AIS about hiring, terminations, and pay rate changes? Question 18 The document that lists each employee's gross pay, payroll deductions, and net pay in a multicolumn format is called Question 19
  • 15. Companies that specialize in processing payroll are known as Question 20 Which of the following will limit a firm's potential loss exposure from paycheck forgery? Question 21 Recording interest earned on an investment is an example of which type of adjusting journal entry? Question 22 Departments that mostly provide services to other units and charge those units for services rendered should be evaluated as ________ centers. Question 23 Cheryl Liao is an accountant at Folding Squid Technologies. While making an adjusting entry to the general ledger, she received the following error message, "Your journal entry must be a numeric value. Please reenter." This message was the result of a Question 24 Budgets and performance reports should be developed on the basis of
  • 16. Question 25 An adjusting entry made at the end of an accounting period that reflects the exchange of cash prior to performance of a related event is classified as a(n) Question 26 Each event in an REA model will in most cases have at least one ________ agent and one ________ agent involved with the event. Question 27 The REA data model Question 28 Which of the following transactions is represented by the diagram below? Question 29 An entity-relationship (E-R) diagram Question 30
  • 17. Relationships that affect the quantity of a resource are sometimes referred to as ________ relationships. Question 31 Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the net present value criterion? Question 32 When using the payback method to determine economic feasibility of projects, the company usually accepts the project with the Question 33 Who is responsible for preparing the specifications that are used to create the programs? Question 34 Refer to the table below, which shows the results of payback, net present value, and internal rate of return analysis of four projects. Which is preferred by the payback criterion? Question 35
  • 18. The capital budgeting technique where estimated future cash flows are discounted back to the present is referred to as Question 36 When canned software is used for systems acquisition, the maintenance aspect of the operations and maintenance phase of the SDLC Question 37 BenathirDonathat, director of the project committee, has received approval from management for implementation of a new accounting information system. After putting out an RFP, the committee settled on a vendor that will provide an industry standard software package and post-sale technical support. The committee decided to go with Question 38 The ________ method calculates and compares the processing times of different AIS to compare system performance. Question 39 End-user computing is likely to result in a(n) Question 40 What would be one duty of second-line help desk personnel? Question 41 One process used to uncover and eliminate program errors is known as
  • 19. Question 42 Who is responsible for identifying such risk factors in an implementation plan? Question 43 Which of the following describes a phase-in conversion? Question 44 Phil in Marketing got a call from Chuck in ITS. "Phil, the system just generated a stock- out report. I wanted to give you a heads up. I'm sending it right over." This is an example of a Question 45 Chuck in ITS got a call from Phil in Marketing. "Chuck, I need you to do something for me. Query sales data for the first quarter and pull out all of the invoices that include the snow blower discount. I need a count and the total amount of the discount. Thanks." This is an example of a +______________________________________________________________________ __________