Professional Documents
Culture Documents
4. The objectives of the data collection activity of the general model for Accounting Information Systems are
to collect data that are
a. relevant and redundant.
b. efficient and objective.
c. efficient and redundant.
d. efficient and relevant.
7. When viewed from the highest to most elemental level, the data hierarchy is
a. attribute, record, file.
b. record, attribute, key.
c. file, record, attribute.
d. file, record, key.
e. key, record, file.
8. Which is NOT an accountant’s primary role in information systems?
a. system user
b. system auditor
c. system designer
d. system programmer
10. Which of the following best describes the activities of the materials management function?
a. purchasing, receiving, and inventory control
b. receiving, sales, distribution, and purchasing
c. receiving, storage, purchasing, and accounts payable
d. purchasing, receiving, and storage
e. purchasing, storage, and distribution
11. Which of the following best describes the activities of the production function?
a. maintenance, inventory control, and production planning
b. production planning, quality control, manufacturing, and cost accounting
c. quality control, production planning, manufacturing, and payroll
d. maintenance, production planning, storage, and quality control
e. manufacturing, quality control, and maintenance
12. Which of the following best describes the activities of the accounting function?
a. inventory control, accounts payable, fixed assets, and payroll
b. fixed assets, accounts payable, cash disbursements, and cost accounting
c. purchasing, cash receipts, accounts payable, cash disbursements, and payroll
d. inventory control, cash receipts, accounts payable, cash disbursements, and payroll
e. inventory control, cost accounting, accounts payable, cash disbursements, and payroll
13. Which statement best describes the issue of distributed data processing (DDP)?
a. The centralized and DDP approaches are mutually exclusive; an organization must choose one
approach or the other.
b. The philosophy and objective of the organization’s management will determine the extent of DDP in the
firm.
c. In a minimum DDP arrangement, only data input and output are distributed, leaving the tasks of data
control, data conversion, database management, and data processing to be centrally managed.
d. The greatest disadvantage of a totally distributed environment is that the distributed information
processing unit locations are unable to communicate and coordinate their activities.
e. Although hardware (such as computers, database storage, and input/output terminals) can be effectively
distributed, the systems development and maintenance tasks must remain centralized for better control and
efficiency.
14. Which of the following is a disadvantage of distributed data processing?
a. End-user involvement in systems operation is decreased.
b. Disruptions due to mainframe failures are increased.
c. The potential for hardware and software incompatibility across the organization is increased.
d. The time between project request and completion is increased.
e. All of the above are disadvantages.
15. Which of the following is least likely to be used as evidence by an external auditor?
a. Substantive tests results
b. Work performed by internal auditors who organizationally report to the controller
c. Tests of controls results
d. Work performed by internal auditors who report to the audit committee of the BOD
18. Which of the following is not a task performed in the audit planning phase?
a. Reviewing an organization’s policies and practices.
b. Planning Substantive Testing Procedures.
c. Reviewing General Controls.
d. Determining the degree of reliance on controls.
22. Which of the following is the best reason to separate duties in a manual system?
a. To avoid collusion between the programmer and the computer operator.
b. To ensure the supervision is not required.
c. To prevent the record keeper from authorizing transactions.
d. To enable the firm to function more efficiently.
23. The importance to the accounting profession of the Sarbanes-Oxley Act is that
a. bribery will be eliminated
b. management will not override the company’s internal controls
c. management are required to certify their internal control system
d. firms will not be exposed to lawsuits
24. The office manager forgot to record in the accounting records the daily bank deposit. Which control
procedure would most likely prevent or detect this error?
a. segregation of duties
b. independent verification
c. accounting records
d. supervision
USERS OF INFORMATION
a. Internal Revenue Service - external user: stakeholder
b. Inventory control manager - internal user
c. Board of directors - external user: stakeholder
d. Customers - external user: trading partner
e. Lending institutions - external user: stakeholder
f. Securities and Exchange Commission - external user: stakeholder
g. Stockholders - external user: stakeholder
h. Chief executive officer - internal user
i. Suppliers - external user: trading partner
j. Bondholders - external user: stakeholder
2. A documentation tool that depicts the physical flow of information relating to a particular transaction
through an organization is a
a. system flowchart.
b. program flowchart.
c. decision table.
d. work distribution analysis.
e. systems survey.
4. The production subsystem of the conversion cycle includes all of the following EXCEPT
a. determining raw materials requirements.
b. make or buy decisions on component parts.
c. release of raw materials into production.
d. scheduling the goods to be produced.
7. Which of the following is NOT an advantage of real-time processing files over batch processing?
a. shorter transaction processing time
b. reduction of inventory stocks
c. improved customer service
d. all are advantages
8. Which statement is NOT correct?
a. Legacy systems may process financially significant transactions.
b. Some legacy systems use database technology.
c. Mainframes are exclusive to legacy systems, while modern systems use only the clientserver model.
d. All the above are true.
10. Which statement is NOT correct? The indexed sequential access method
a. is used for very large files that need both direct access and batch processing.
b. may use an overflow area for records.
c. provides an exact physical address for each record.
d. is appropriate for files that require few insertions or deletions.
16. Which of the following is true of the relationship between subsidiary ledgers and general ledger
accounts?
a. The two contain different and unrelated data.
b. All general ledger accounts have subsidiaries.
c. The relationship between the two provides an audit trail from the financial statements to the source
documents.
d. The total of subsidiary ledger accounts usually exceeds the total in the related general ledger account.
17. Real-time systems might be appropriate for all of the following EXCEPT
a. airline reservations.
b. payroll.
c. point-of-sale transactions.
d. air traffic control systems.
e. all of these applications typically utilize real-time processing.
19. A chart of accounts would best be coded using a(n) ______________ coding scheme.
a. alphabetic
b. mnemonic
c. block
d. sequential
21. A coding scheme in the form of acronyms and other combinations that convey meaning is a(n)
a. sequential code.
b. block code.
c. alphabetic code.
d. mnemonic code.
22. Batch processing will not permit
a. Data to be edited on a separate computer run.
b. The use of a database structure.
c. Decision table.
d. Data flow diagram.
e. Systems survey.
CHAPTER 3
1. Management can expect various benefits to follow from implementing a system of strong internal control.
Which of the following benefits is least likely to occur?
a. reduction of cost of an external audit
b. prevention of employee collusion to commit fraud
c. availability of reliable data for decision-making purposes
d. some assurance of compliance with the Foreign Corrupt Practices Act of 1977
e. some assurance that important documents and records are protected
3. The underlying assumption of reasonable assurance regarding implementation of internal control means
that
a. auditor is reasonably assured that fraud has not occurred in the period.
b. auditors are reasonably assured that employee carelessness can weaken an internal control structure.
c. implementation of the control procedure should not have a significant adverse effect on efficiency or
profitability.
d. management assertions about control effectiveness should provide auditors with reasonable assurance.
e. a control applies reasonably well to all forms of computer technology.
4. To conceal the theft of cash receipts from customers in payment of their accounts, which of the following
journal entries should the bookkeeper make?
DR CR
a. Miscellaneous Expense Cash
b. Petty Cash Cash
c. Cash Accounts Receivable
d. Sales Returns Accounts Receivable
e. None of the above
5. Which of the following controls would best prevent the lapping of accounts receivable?
a. Segregate duties so that the clerk responsible for recording in the accounts receivable subsidiary ledger
has no access to the general ledger.
b. Request that customers review their monthly statements and report any unrecorded cash payments.
c. Require customers to send payments directly to the company’s bank.
d. Request that customers make checks payable to the company.
6. Providing timely information about transactions in sufficient detail to permit proper classification and
financial reporting is an example of
a. the control environment.
b. risk assessment.
c. information and communication.
d. monitoring.
7. Ensuring that all material transactions processed by the information system are valid and in accordance
with management’s objectives is an example of
a. transaction authorization.
b. supervision.
c. accounting records.
d. independent verification.
10. The fraud scheme that is similar to the ‘‘borrowing from Peter to pay Paul’’ scheme is
a. expense account fraud.
b. bribery.
c. lapping.
d. transaction fraud.
11. Computer applications use routines for checking the validity and accuracy of transaction data called
Edit programs
12. How does a real-time file processing system edit individual transactions?
Takes place in online mode as transactions are entered.
16. An employee in a receiving department keyed in a shipment from a remote terminal and inadvertently
omitted the purchase order number. The best system control to detect this error would be a
Completeness test.
17. Passive techniques designed to reduce the frequency of occurrence of undesirable events are
a. IT controls
b. corrective controls
c. application controls
d. preventative controls
e. detective controls
18. Devices, techniques, and procedures designed to identify and expose undesirable events are
a. IT controls
b. corrective controls
c. application controls
d. preventative controls
e. detective controls