Professional Documents
Culture Documents
1. The type of diagram in which the operations are specified on objects is considered as
a. functional diagrams
b. class diagrams
c. attribute diagrams
d. entity diagrams
2. The particular database and the set of related programs which helps in implementation of
updates and queries is called
a. implemented applications
b. backup applications
c. utility programs
d. database application
3. In traditional DBMS, the application programs are considered to be the part of domain of
a. database designs
b. software engineering
c. network design utility
d. utility designs
4. The Universal Modeling Language in database management system is classified as
a. object modeling methodology
b. query modeling methodology
c. entity modeling methodology
d. attribute modeling methodology
5. The most popular high level conceptual model in database management system is
a. close end relation model
minimum cardinality
b
Maximum cardinality
c.
ERD
d.
7. Which type of entity cannot exist in the database unless another type of entity also exists
in the database, but does not require that the identifier of that other entity be included as
part of its own identifier?
a.
Weak entity
b.
Strong entity
c.
ID-dependent entity
d.
a.
Parent
c.
Instance
b.
child
d.
subtype
a.
Supertype entity
b.
Subtype entity
c.
Archetype entity
Instance entity
a.
Itself
b.
a subtype entity
c.
an archetype entity
d.
an instance entity
11. In which of the following is a single-entity instance of one type related to many entity
instances of another type?
a.
One-to-One Relationship
b.
One-to-Many Relationship
c.
Many-to-Many Relationship
d.
Composite Relationship
a.
Database
b.
entity class
c.
Attribute
d.
ERD
13. Which of the following is NOT a basic element of all versions of the E-R model?
a.
Entities
b.
Attributes
c.
Relationships
d.
Primary keys
14. Which of the following is a Data Model?
a. Entity-Relationship Model
b. Relational Data Model
c. Object-based data model
d. All of the above
15. Which of the following is not a Storage Manager Component?
a. Transaction Manager
b. Logical Manager
c. Buffer Manager
d. File Manager
b. Audit Trail
d. Audit Trail
2. Which of the following is not used for Audit Command Language (ACL)?
a. Gather essential information for effective decision-making
b. Access server data
c. Both a and b
d. None of the above
4. Which of the following statement is/are correct regarding why choose ACL over other
software product?
Statement I. ACL has maintained its first to market lead
Statement II. Only ACL provides ease of scalability
a. Statement I is correct
b. Statement II is correct
c. Pictures
b. Table
d. Formula
7. It is used to make it easy to create tables for all common data types.
a. Data Definition Wizard
c. Data Table
b. Data Language
d. Data Validation
10. Which of the following command used to determine values for the Stratify, Histogram, and
Sample commands?
a. Statistics
c. Profile
b. Benford
d. Export
11. Which of the following command used to provides a more complete overview of the
significant properties of a numeric file?
a. Statistics
c. Profile
b. Benford
d. Export
12. Which of the following command used to digital analysis identifies anomalies in certain
types of data?
a. Statistics
c. Profile
b. Benford
d. Export
c. Summarize
b. Classify
d. Age
14. It is use to summarize data according to ranges based on unique values in a single character
field.
a. Stratify
c. Cross-tabulate
b. Classify
d. Age
15. It is use to produce a summary of the data according to ranges based on multiple character or
date fields, and display the results with selected data from associated fields.
a. Classify
c. Age
b. Cross-tabulate
d. Summarize
a)
b)
c)
d)
3. The primary repository of financial information on the Internet is the Security and
Exchange Commissions Electronic Data Gathering and Retrieval Database.
a)
b)
c)
d)
Hyperlink
EDGAR
eXtensibleMarkup Language (XML)
eXtensible Business Reporting Language (XBRL)
E-Payments
Electronic Commerce (EC)
E-Wallets
None of the Above
8. It may be a more desirable payment method. It eliminates the need to transmit credit card
number over the Internet.
a)
b)
c)
d)
11. Open system designs allow mission-critical information to be at the risk to intruders.
a)
b)
c)
d)
Authentication
Nonrepudiation
Confidentiality of data
Data integrity
12. Allows organizations to transmit standard business documents over high-speed data
communications channels.
a)
b)
c)
d)
13. It guards against unauthorized access to sensitive file information from external Internet
users.
a)
b)
c)
d)
Firewalls
Value Added Networks (VAN)
Electronic Data Interchange (EDI)
Proxy Servers
14. It is a computer and related software that creates a transparent gateway to and from the
Internet, and that can be used to control Web access.
a)
b)
c)
d)
15. It is used to authenticate business documents transmitted or received over the internet.
a)
b)
c)
d)
c. Computer reports
d. Internal Controls
2. Documents in an accounting information system are:
a. Always paper-based
b. Always electronic
c. Either paper-based or electronic
d. Neither paper-based nor electronic
3. Which of the following best demonstrates the relationship between accounting
information systems and other areas of accounting?
a. Tax accountants have to create budgets.
b. Auditors often prepare tax returns for their clients.
c. Virtually all areas of accounting involve inputs, processes, outputs, storage and
internal controls.
d. Accounting information systems is the most important area of accounting.
4. The relationship between accounting information systems and information technology is
most clearly shown by:
I.
Using debits and credits to record transactions
II.
Incorporating journals and ledgers as processing tools
a.
b.
c.
d.
I only
II only
Both I and II
Neither I nor II
Alex Gaskarth wrote a check to pay a suppliers invoice. The check had to be signed by
two company officers and was later part of a monthly bank reconciliation. The canceled
check was filed under the suppliers name.
11. These software solutions include financial functions interfaced with manufacturing, sales
and distribution, and human resource applications.
a. Integrated Accounting Software programs
b. Extended application interfaces
c. Central Database
d. Enterprise Resource Planning (ERP) systems.
12. A software package that has everything offers maximum integration. However, the
flexibility of choosing the best software in different categories may argue for a
__________.
a. Outsourcing
b. Internal outsourcing
c. External outsourcing
d. Best-of-breed
13. These services are necessary due to the complexity of the mid-range accounting
programs, this offers a broader array of services for more software programs,
a. Value Added Reseller (VAR)
b. Requirements Analysts
c. Value Added Buyer( VAB)
d. Computer Training Services (CTS)
14. Describes an approach to cutting expenses to their bare minimum.
a. Best-of-Breed Approach
b. Spend Management
c. Procurement Expenses
d. Strategic Finance
15. It is a program instruction written in a high-level computer language.
a. Bar code
b. Encryption
c. Source Code
d. Customer ID
ACCOUNTING INFORMATION SYSTEM AND THE ACOUNTANT
1. Which of the following is the correct definition of accounting information system?
a. It is a way of using business applications over the Internet.
b. It is all about providing relevant information to individuals and groups outside an
organizations boundaries.
c. It is a collection of data and processing procedures that creates needed
information for its users.
d. It stores important nonfinancial information that are relevant to the decision-making
processes of their users.
2. It is about reallocating the IT budget from maintenance to improve business processes
and deliver innovation to the finance organization.
a. Cloud computing
E-Business
Information age
Trade-offs
Website trading
4. It combines the skills of investigation, accounting, and auditing to find and collect pieces
of information that collectively provide evidence that criminal activity is in progress or
has happened.
a.
b.
c.
d.
Governmental accounting
Forensic accounting
Management accounting
Financial accounting
Accountants
Knowledge workers
Computer programmers
System consultants
8. It is a set of professional service areas built around a set of common principles and
Taxation
Auditing
Managerial Accounting
Sustainability Accounting
10. Its main objective is to provide relevant information to individuals and groups outside an
organizations boundaries.
a.
b.
c.
d.
Managerial Accounting
Auditing
Taxation
Financial Accounting
Cost Accounting
Financial Accounting
Auditing
Risk Accounting
13. An accountant can acquire this certification by meeting the qualifications of the
Association of Certified Fraud Examiners (ACFE).
a. Certified Public Accountant (CPA)
b. Certified Fraud Examiner (CFE)
c. Certified Managerial Accountant (CMA)
Cloud computing
Sustainability reporting
Predictive analytics
Forensic accounting
15. This refers to one of the abilities of computers which is to output vast amounts of
information quickly.
a.
b.
c.
d.
Information age
Information overload
Interactive data
System failure
The command center of Access file that appears when you create or open the MS Access
database file.
a Switchboard
c Design View Window
d Database Window
b Query Window
The third stage in designing a database is when we analyze our tables more closely and
create a _________________ between tables.
a Join
c Query
d None of these
b Relationship
This is the stage in database design where one gathers and list all the necessary fields for
the database project.
a Data Definition
c Establishing Relationship
d None of these
b Data Refinement
c
d
In an indexed field, you may or may not enter duplicate value depending
upon the setting.
All statements are true.
A database language concerned with the definition of the whole database structure and
schema.
a Data Control Language (DCL)
b Data Manipulation Language (DML)
c Data Definition Language (DDL)
d All of these.
Which of the following data type is used to store logical value in MS Access?
a True/False
c Yes/No
d All of these.
b On/Off
Date only.
Time cannot be stored.
a
b
c
d
Memo
Picture
Currency
AutoNumber
3. Statement 1: One advantage of a form is that it can display all the data-entry textboxes for
an entire record in multiple screens.
Statement 2: Objects such as textboxes and labels that appear on a form are examples of
form controls.
Answer: B
4. Statement 1: Bound controls are textboxes, drop-down boxes, and similar controls that
depend on the underlying data and therefore change from record to record.
Statement 2: Unbound controls are labels, pictures, and similar items that are consistent
from record to record in a form and do not display underlying database information.
Answer: C
5. Statement 1: If youre using Access to print something on paper, the chances are high that
you are using a report to perform this task.
Statement 2: Unlike forms, reports are strictly outputs and do not allow users to input
data into databases.
Answer: C
6. The following are the steps to create a form in Access using Form Wizard:
1. Customize the form
2. Enter the appropriate settings in the Form Wizard dialog boxes
3. Refine your design
4. Reset the tab order
13. It is the technical term for the point at which a group changes from one type to the next in
a report.
a. Control break
c. Report Wizard
b. Calculated Fields
d. Query
14. Which of these is not a typical content of a report header?
a. Company name and address
b. Page number
c. Date Prepared
d. Company logo
15. It is often the points at which managers want to see subtotals, maximums, minimums,
averages, or similar subgroup summaries.
a. Calculated Fields
c. Control breaks
b. Forms
d. Tables
BUSINESS PROCESS PART 2
1.) Source documents generally help to improve accuracy in transaction
processing because
A. They specify which information to collect due to their structure.
B. Standard information is preprinted on the document.
C. They provide directions and steps for completing the form.
D. All of the above are correct.
2.) Federal Express stated in one of its mission statements that "positive control
of each package will be maintained by utilizing . . . electronic tracking and
tracing systems. This is an example of which type of data processing?
A. Real-time processing which features immediate updating as to the
location of
packages.
B. Batch processing which features updating at fixed time periods.
C. Real-time processing which features updating at fixed time periods such as
at the end of an accounting period.
D. Batch processing which features immediate updating as to the location of
packages.
3.) When the sum of all entries in the subsidiary ledger equals the amount in the
corresponding general ledger account, it is assumed that
A. The recording and posting process are accurate.
B. All of the transaction cycles have been completed.
C. Since the ledgers are in balance, adjusting entries are not required.
D. No errors exist in the subsidiary ledger and corresponding general ledger
account.
10.)
The efficiency of recording numerous business transactions can be best
improved by the use of
A. Prenumbered source documents.
B. Specialized journals.
C. Posting references.
D. Segregation of duties.
11.)
One of the objectives of the segregation of duties is to
A. Ensure that no collusion will occur.
B. Make sure that different people handle different transactions.
C. Achieve an optimal division of labor.
D. Make sure that different people handle different parts of the same
transactions.
12.)
Which of the following cash receipts activities would be incompatible
with the others?
A. Opening the mail and endorsing the checks.
B. Counting cash and making out a deposit slip.
C. Posting the cash receipts to the customer accounts
D. Carrying the cash deposit to the bank.
13.)
The main area of weakness in the practical application of the
separation of duties is
A. When collusion between employees occurs.
B. Poor supervision.
C. Poor documentation.
D. Inadequate training of employees.
14.)
Which managerial tool below is used to provide the organization with
financial control?
A. A cash budget
B. A performance report
C. A sales budget
D. A customer satisfaction survey
15.)
Regarding internal control considerations, the key to accountability for
all business transactions is
A. Processing internal and external data together into meaningful information.
B. Ensuring that business activities are performed efficiently and in accordance
with management's objectives.
C. Possessing and maintaining adequate documentation.
D. Realizing that AIS can directly affect employee behavior.
1.)
2.)
3.)
4.)
These are sequential codes in which specific blocks of numbers are reserved for
particular uses.
a. Group codes
c. Number codes
b. Sequence code
d. Block codes
c. AIS report
b. Management report
d. Financial statements
Companies use variety of source documents to collect data for the AIS. Which among the
following does not concerns the chief in the process of the collection of data?
a. Verifiability
b. Accuracy
5.)
c. Timeliness
d. Cost-effectiveness
6.)
It is a business process that begins with a customer order for goods or services and ends
with the collection of cash from the customer.
7.)
a. Sales process
c. Purchase process
b. Order Report
8.)
9.)
These are software packages that help companies collect corporate knowledge, data, and
business system to improve core business processes.
a. BPM software
c. CRM software
b. AIS
d. Database
10.)
a. Statement 1 is correct
b. Statement 2 is correct
All, except one are the benefits of using and accounting system in business processes.
a. Accounting system makes recording transactions easier and faster.
b. Using an accounting system allows data storage and collection to be more systematic
and organized.
c. Accounting systems enables the company to be more competitive.
d. Accounting systems eliminate the need for accountants.
11.)
12.)
13.)
14.)
c. Statement 1 is correct
d. Statement 2 is correct
c. Reports to investors
It is a report issued only when a particular event occurs, containing lists of exceptional
conditions.
a. Events report
c. Conditional Report
b. Exception report
d. Specific Report
15.)
a. Statement 1 is correct
b. Statement 2 is correct
Which among the following shows that an AIS in a sales process is good:
a. It matches each revenue with a valid transaction.
b. It maintains customer records.
c. Allows an interface with the inventory control function.
d. All of the above
MS ACCESS
2. Which Of The Following Creates A Drop Down List Of Values To Choose From?
A) Ole Object
B) Hyperlink
C) Memo
D) Lookup Wizard
3. The Command Center Of Access File That Appears When You Create Or Open The Ms
Access Database File.
A) Database Window
B) Query Window
C) Design View Window
D) Switchboard
4. The Third Stage In Designing A Database Is When We Analyze Our Tables More Closely And
Create A ___________ Between Tables
A) Relationship
B) Join
C) Query
D) None Of These
5. What is a form in MS Access
A) It is a printed page where users will write their data to fill it up
B) It is an input screen designed to make the viewing and entering data easier
C) This is an important part of database used by analysts to draw conclusions
D) All of above
6. This Key Uniquely Identifies Each Record
A) Primary Key
B) Key Record
C) Unique Key
D) Field Name
7. It Is An Association Established Between Common
A) Line
B) Relationship
C) Primary Key
D) Records
8. Which of the following is not a type of relationship that can be applied in Access database
A) One to One
B) One to Many
C) Many to Many
D) All of above can be applied
9. A Database Language Concerned With The Definition Of The Whole Database Structure And
Schema Is ________
A) DCL
B) DML
C) DDL
D) All Of Above
10. Which Of The Field Has Width 8 Bytes?
A) Memo
B) Number
C) Date/time
D) Hyperlink
11. Which Of The Following Statement Is True?
A) Foreign Key Fields Don\'t Allow Duplicate Values
B) In Primary Key Field You Can Enter Duplicate Value
C) In An Indexed Field You May Or May Not Enter Duplicate Value
Setting
D) All Statements Are True
12. Following Is Not A Database Model
A) Network Database Model
B) Relational Database Model
C) Object Oriented Database Model
D) None
Depending Upon
b. Hot backup
c. Electronic vaulting
d. UPS (Uninterruptible power system)
4. In a routing verification procedure, any transaction or message
transmitted over network should have a:
a. Header label
c. Trailer label
b. Checkpoint
d. Footer label
5. Logical security include the following except:
a. System authentication
c. Biometrics
b. Alarm systems
d. Smart cards
6. Organizations should encourage employees to create strong
passwords. Each character that is added to a password increases the
protection that it provides. Passwords should be 8 or more characters
in length; ___ characters or longer is ideal.
a. 14
c. 12
b. 10
d. 13
7. Statement 1: Preprinted recording forms ensure that all the data
required for processing have been collected and also enhance
accuracy in the recording process.
Statement 2: Output controls focus on the manipulation of accounting
data after they are input to the computer system.
a. Statement 1 and 2 is true
b. Only Statement 2 is false
c. Only Statement 1 is false
d. Statement 1 and 2 is false
8. When cash receipts from customers are processed, the manual sum of
the customers account numbers in a batch of transactions might be
computed to form a:
a. Batch total
c. Hash total
b. Control total
d. Record count
9. These listings provide complete, detailed information about all changes
to master files and thus contribute to a good audit trail.
a. Output listings
c. Software
documentation
b. Compiler
d. Activity listings
10.
An_______ system, supported by a comprehensive security
policy, can significantly reduce the risk of attack because it increases
the costs and resources needed by an intruder.
a. Integrated system
c. Logical system
b. Physical system
d. Internal control
11.
12.
It is a function within an IT environment that maintains custody
of files, databases, and computer programs in separate storage area.
a. Programming function
c. Computer operations
function
b. AIS library function
d. Systems analysis
function
13.
14.
A fault-tolerant system can use _______, in which transactions
are never written to disk until they are complete.
a. Disk mirroring
c. Watchdog processor
b. Rollback processing
d. Backup
15.
Under batch processing, the procedure that uses the three
generations of reference data retained with the transaction data used
during the general ledger updating process is called:
a. Grandfather-parent-child procedure
b. Great-great-grandfather procedure
c. Parent-parent-child procedure
d. None of the above
IT AUDITING
1. A companys own accounting employees perform a(n):
a. Internal Audit
b. External Audit
c. Both
d. None of the above
The order in which the above steps should be preferably followed is:
a. II, IV, III, I
c. II, I, IV, III
b. II, III, I, IV
d. II, III, IV, I
For items 10 to 12 write:
e.
f.
g.
h.
If
If
If
If
10.
Statement 1: Spreadsheet software doesnt allowed both
accountants and auditors to make complex calculations automatically.
Statement 2: Spreadsheet software can be used to perform analytical
procedures such as computing ratios.
Answer: A
11.
Statement 1: Database Management System can sort data and
make certain mathematical computations.
Statement 2: A Databes Management System is the backbone of
almost all organizational accounting systems.
Answer: C
12.
Statement 1: Automated workpapers cant help auditors create
common-size income statements and balance sheets that show
account balances as percentages.
Statement 2: Automated workpapers doesnt allow internal and
external auditors to automate and standardize specific audit tests and
audit documentations.
Answer: D
13.
A parallel simulation
a. Creates a second system that duplicates a portion of the
clients system.
b. Develop a set of transactions that tests, as completely as possible,
the range of exception situations that might occur.
c. Validates an applications input control.
d. Sort data and make certain mathematical computations.
14.
It describes itself as a global resource for auditors.
a. AuditBlog
c. AuditNet
b. AuditPage
d. AuditWeb
15.
It is the required minimum password length by the auditors to
use in software tools to review systems software.
a. 7
c. 9
b. 6
d. 5
a.
b.
c.
d.
Preventive Controls
Detective Controls
Discretionary Controls
Corrective Controls
1. When converting to a new system, which of the following conversion alternatives would
be the most risky for a financial services firm.
a. preliminary investigation of current conducted by the steering committee
b. planning for a success
c. direct conversion
d. follow up implementation
2. A feasibility area that anticipated benefits of the system exceed its projected costs.
a. Legal
b. Economic
c. Technical
d. Operational
3. The study team must analyze the results which includes:
a. Highlighting bottlenecks in information flows
b. Reporting redundancy
c. Both A and b
d. None of the Above
4. There are several ways of gathering data, including:
a. Review of existing documentation.
b. Observation of the current system
c. Using questionnaires and surveys
d. All of the Above
5. A feasibility area which examines its compatibility with the current operating
environment.
a. Legal
b. Economic
c. Technical
d. Operational
6. It provides a system study team with an objective means for selecting a final AIS.
a. A point-scoring analysis
b. Documentation
c. Constraints
d. Controls
7. This step involves performing a preliminary investigation of the existing system,
organizing a systems study team, and developing strategic plans for the remainder of the
study.
a. Planning and Investigation
b. Analysis
c. Design
d. Implementation, Follow-up, and Maintenance
8. This documentation includes descriptive data such as organizational charts, strategic
plans, budgets, policy and procedure manuals, job descriptions, and charts of accounts, as
well as technical documentation such as owcharts, process diagrams, and training
manuals.
a. Observe the Current System in Operation
b. Use Questionnaires and Surveys
c. Review Existing Documentation
d. Interview System Participants
9. Gantt charts are useful
a. for managers to identify critical paths
b. for observing employee work performance
c. for evaluating the control procedures
d. for scheduling and tracking the activities of systems implementation projects
10. It requires the design team to estimate how long it will take a new or revised system to
become operational and to communicate this information to the steering committee.
a. Schedule Feasibility
b. Economic Feasibility
c. Legal Feasibility
d. Operational Feasibility
In the world of computing, the essential element that controls how computers are used is
a. Ethics
b. Legal laws
c. Security requirements
d. Business demands
2.
The guidelines for the morally acceptable use of computers in society are
a. Computer ethics
b. Privacy
c. Morality
d. Legal systems
3.
The issues that deal with the collection and use of data about individuals is
a. Access
b. Property
c. Accuracy
d. Privacy
4.
5.
The ethical issue that involves who is able to read and use data is
a. Access
b. Property
c. Accuracy
d. Privacy
6.
7.
Businesses search employees electronic mail and computer files using so-called
a. Trojan horses
b. Cookies
c. Snoopware
d. Theft-ware
8.
Small files that are deposited on a users hard drive when they visit a Web site are best
describe as
a. Cookies
b. Codes
c. Profiles
d. Trackers
9.
c. Outside users
d. Members of organized crime
10.
A computer crime is
a. Any activity in which the thief uses computer technology
b. An illegal action in which the perpetrator uses special knowledge of computer
technology
c. An immoral action in which the thief uses special knowledge of computer technology
without the other person knowing
d. Any threat to computer or data security
11.
People who gain unauthorized access to computers for the fun of it, but do not
intentionally do damage, are
a. Employees
b. Hackers
c. Crackers
d. Members of organized crime
12.
A computer virus is
a. A software written with malicious intent to cause annoyance or damage
b. A process of scrambling a message so that it cannot be read until it is unscrambled
c. A small device that scans the number of credit cards
d. An ID-checking tool used to monitor who is logged onto a network
13.
14.
A __________ acts as a security buffer between a companys private network and all
external networks.
a. Firewall
b. Password
c. Disaster recovery plan
d. Virus checker
15.
A __________ can help to avoid loss o information and data and protect computer
systems from access by unauthorized persons.
a. Firewall
b. Password
c. Disaster recovery plan
d. Back-up files
DOCUMENTING AIS
1. Many documentation tools are available to explain how a system works. Which tool provides a
graphical description of the sources and destinations of data as well as data flow within the
organization and the processes that transform and store that data?
o
o
o
o
Online keying
Display
Computer processing
Manual operation
o
o
o
o
7. The data flow diagram symbol which represents data flows is the
o
o
o
o
o
Square.
Arrow.
Circle.
Parallel lines.
Parallelogram.
8. A flowchart is
o An analytical technique used to describe the data flows and sources and destinations and
data stores of a system.
o An analytical technique used to describe some aspect of an information system in a
clear, concise, and logical manner.
o A piece of hard plastic used to draw symbols.
o A graphical description of the flow of data within an organization and the processes
performed on that data, as well as the sources and destinations of data.
9. An example of a data input would be a(n)
o
o
o
o
Payroll check.
Tax payment.
Tax report.
Employee change form.
10. Which documentation technique illustrates the flow of documents and information among
areas of responsibility within an organization?
o
o
o
o
11. Which of the following is not a guideline for drawing a Data Flow Diagram (DFD)?
o Develop a context diagram
o Subdivide the DFD
13. I. In a systems flowchart, a document symbol may be directly linked to a magnetic disk/drive
symbol.
II. The highest level DFD is called a Context Diagram.
o
o
o
o
14. I. The Program Flowchart depicts the relationships among the input, processing, and output
of an Accounting Information System (AIS).
II. Data Flows represent the transformation of data.
o
o
o
o
15. I. Data Flow Diagrams (DFDs) generally have to be subdivided to be made more
understandable.
II. Inverted triangle serves as multiple copies of a specific document.
o
o
o
o