You are on page 1of 6

UNIVERSITY OF BOHOL

COLLEGE OF BUSINESS AND ACCOUNTANCY

COMP 1C ACCOUNTING INFORMATION SYSTEM LECTURE


FINAL EXAMINATION

NAME: _____________________________________________ Thursday, April 7, 2021


COURSE & YEAR: _____________________________________ Instructor: Karen C. Labor, CPA

Multiple Choice d. Most computer systems are designed so that transaction trails
useful for audit purposes do not exist.
1. A software package that is used with a large set of organized data
that presents the computer as an expert on a particular topic is 11. A general type of IT system that is designed to improve the
referred to as a(n) productivity of daily office work is referred to as a(n)
a. Data mining. a. Office automation system.
b. Expert system. b. Transaction processing system.
c. Artificial intelligence. c. Decision support system.
d. Virtual reality. d. Executive information system.

2. Computer memory which is used to store programs that must be 12. The Systems Development Life Cycle (SDLC) is the traditional
accessed immediately by the central processing unit is methodology for developing information systems. In which phase of
a. Primary storage. the SDLC would the activity of identifying the problem(s) that need
b. Secondary storage. to be solved most likely occur?
c. Tertiary storage. a. Analysis.
d. Tape storage. b. Implementation.
c. Planning.
3. The most common output device is a(n) d. Development.
a. Mouse.
b. Printer. 13. Samco Inc. is in the process of designing a new customer
c. Expert system. relations system. In which phase of the development life-cycle would
d. Keyboard. a needs assessment most likely be performed?
a. Analysis.
4. The part of the computer that does most of the data processing is b. Design.
referred to as the c. Development.
a. Analyzer. d. Testing.
b. Compiler.
c. CPU. 14. Which of the following system implementation models has the
d. Printer. advantage of achieving a full operational test of the new system
before it is implemented?
5. An “office suite” of software is least likely to include a(n) a. Parallel implementation.
a. Database. b. Plunge implementation.
b. Operating system. c. Pilot implementation.
c. Spreadsheet. d. Phased implementation.
d. Word processing.
B. Characteristics of Computer Systems—General
6. Software that performs a variety of general technical
computer-controlling operations is a(n) 15. Which computer application is most frequently used on
a. Integrated “suite.” mainframe computers?
b. Shareware. a. Databases.
c. Database. b. Graphics.
d. Operating system. c. Spreadsheets.
d. Word processing.
7. Which of the following is not a part of the central processing unit?
a. Control unit. 16. Which computer application is most frequently used to analyze
b. Arithmetic unit. numbers and financial information?
c. Logic unit. a. Computer graphics programs.
d. Printer unit. b. WAN applications.
c. Spreadsheets.
8. MIPS stands for d. Word processing programs.
a. Memory in protocol standards.
b. Millions of instructions per second. 17. Analysis of data in a database using tools which look for trends or
c. Mitigating individualistic personnel standards. anomalies without knowledge in advance of the meaning of the data
d. Multiple input physical savings. is referred to as
a. Artificial intelligence.
9. Which of the following represents a type of applications software b. Data mining.
that a large client is most likely to use? c. Virtual reality.
a. Enterprise resource planning. d. Transitory analysis.
b. Operating system.
c. Central processing unit. 18. The most common type of primary storage in a computer is
d. Value-added network. referred to as
a. CMAN.
10. Which of the following characteristics distinguishes computer b. RAM.
processing from manual processing? c. ROM.
a. Computer processing virtually eliminates the occurrence of d. Flash memory.
computational error normally associated with manual processing.
b. Errors or fraud in computer processing will be detected soon after 19. A set of step-by-step procedures used to accomplish a task is a(n)
their occurrences. a. Algorithm.
c. The potential for systematic error is ordinarily greater in manual b. Compilation master.
processing than in computerized processing. c. Linux.
d. Transistor.
1
20. Which of the following compiles a complete translation of a c. Batch processing system.
program in a high-level computer language before the program is d. Online real-time system.
run for the first time?
a. Visual Basic. 32. Which of the following characteristics distinguishes electronic
b. Java. data interchange (EDI) from other forms of electronic commerce?
c. Algorithm. a. EDI transactions are formatted using the standards that are
d. Compiler. uniform worldwide.
b. EDI transactions need not comply with generally accepted
21. GUI is the abbreviation for accounting principles.
a. Grandfather, Uncle, Individual. c. EDI transactions ordinarily are processed without the Internet.
b. Graphical User Interface. d. EDI transactions are usually recorded without security and privacy
c. Graphics Utilization Institutes. concerns.
d. Grand Union Internet.
33. LAN is the abbreviation for
22. Unix is a(n) a. Large Area Network.
a. Operating system. b. Local Area Network.
b. Singular disk drive. c. Longitudinal Analogue Network.
c. Central processing unit. d. Low Analytical Nets.
d. Logic unit.
34. A computer that is designed to provide software and other
23. In a spreadsheet, each specific cell may be identified by a specific applications to other computers is referred to as a
a. Address. a. Microcomputer.
b. Column. b. Network computer.
c. Row. c. Server.
d. Diagonal. d. Supercomputer.

24. In a spreadsheet, which of the following is correct concerning 35. Which is least likely to be considered a component of a computer
rows and columns? network?
a. Applications programs.
Rows Columns b. Computers.
a. Numbered Numbered c. Software.
b. Numbered Lettered d. Routers.
c. Lettered Numbered
d. Lettered Lettered 36. The network most frequently used for private operations
designed to link computers within widely separated portions of an
25. Which of the following is least likely to be considered an organization is referred to as a(n)
advantage of a database? a. Bulletin board service.
a. Easy to store large quantities of information. b. Local area network.
b. Easy to retrieve information quickly. c. Wide area network.
c. Easy to organize and reorganize information. d. Zero base network.
d. Easy to distribute information to every possible user.
37. A set of rules for exchanging data between two computers is a
26. Most current computers process data using which of the a. Communicator.
following formats? b. Operating system.
a. Analog. c. Protocol.
b. Digital. d. Transmission speed.
c. Memory enhanced.
d. Organic. 38. A webpage is most frequently created using
a. Java or C++.
27. Which term below describes the technology that allows multiple b. Visual Basic.
operating systems to run simultaneously on a single computer? c. SQL.
a. Client. d. HTML or XML.
b. Mainframe.
c. Linux. 39. Laptop computers provide automation outside of the normal
d. Virtualization. office location. Which of the following would provide the least
security for sensitive data stored on a laptop computer?
28. What type of secondary storage device requires no moving parts a. Encryption of data files on the laptop computer.
for read/write operations? b. Setting up a password for the screensaver program on the laptop
a. Magnetic tape. computer.
b. Compact discs. c. Using a laptop computer with a removable hard disk drive.
c. Solid State drives. d. Using a locking device that can secure the laptop computer to an
d. RAID. immovable object.

29. Another term for cloud-based storage is 40. When developing a new computer system that will handle
a. RAID. customer orders
b. Solid state storage. and process customer payments, a high-level systems design phase
c. Analog. would include determination of which of the following?
d. Storage-as-a-Service. a. How the new system will affect current inventory and general
ledger systems.
30. The wireless input device that is used for inventory control and b. How the file layouts will be structured for the customer order
similar to bar-codes technology but does not require line-of sight records.
access is c. Whether to purchase a turn-key system or modify an existing
a. MICR. system.
b. RFID. d. Whether formal approval by top management is needed for the
c. Touch screen. new system.
d. Point-of-sale recorders.
**41. A company using EDI made it a practice to track the functional
31. What type of computer system is characterized by data that are acknowledgments from trading partners and to issue warning
assembled from more than one location and records that are messages if acknowledgments did not occur within a reasonable
updated immediately? length of time. What risk was the company attempting to address by
a. Microcomputer system. this practice?
b. Minicomputer system.

2
a. Transactions that have not originated from a legitimate trading d. Directing that personnel do not send highly sensitive or
partner may be inserted into the EDI network. confidential messages using electronic mail.
b. Transmission of EDI transactions to trading partners may
sometimes fail. 50. Which of the following risks is more likely to be encountered in
c. There may be disagreement between the parties as to whether an end-user computing (EUC) environment as compared to a
the EDI transactions form a legal contract. mainframe computer system?
d. EDI data may not be accurately and completely processed by the a. Inability to afford adequate uninterruptible power supply systems.
EDI software. b. User input screens without a graphical user interface (GUI).
c. Applications that are difficult to integrate with other information
42. Management is concerned that data uploaded from a systems.
microcomputer to the company’s mainframe system in batch d. Lack of adequate utility programs.
processing may be erroneous. Which of the following controls would
best address this issue? 51. The 2nd generation programming language that is generally
a. The mainframe computer should be backed up on a regular basis. specific to a computer architecture (i.e., it is not portable) is
b. Two persons should be present at the microcomputer when it is a. Binary.
uploading data. b. Assembly language.
c. The mainframe computer should subject the data to the same c. COBOL.
edits and validation routines that online data entry would require. d. C++.
d. The users should be required to review a random sample of
processed data. 52. The online analytical processing term that represents a
combination of systems that help aggregate, access, and analyze
Items 43 and 44 are based on the following information: business data and assist in the business decision-making process is
One major category of computer viruses is programs that attach a. Artificial intelligence.
themselves to other programs, thus infecting the other programs. b. Data mart.
While many of these viruses are relatively harmless, some have the c. Decision support system.
potential to cause significant damage. d. Business intelligence.

43. Which of the following is an indication that a computer virus of 53. What is the hierarchy of data organization, from smallest to
this category is present? largest unit, for a relational database?
a. Frequent power surges that harm computer equipment. a. Bit, byte, field, record, table, database.
b. Unexplainable losses of or changes to data. b. Byte, bit, record, field, table, database.
c. Inadequate backup, recovery, and contingency plans. c. Byte, bit, table, field, record, database.
d. Numerous copyright violations due to unauthorized use of d. Database, table, field, record, byte, bit.
purchased software.
54. A current day instruction to a computer such as “Extract all
44. Which of the following operating procedures increases an Customers where ‘Name’ is Smith” would most likely relate to a
organization’s exposure to computer viruses? a. First generation programming language.
a. Encryption of data files. b. Fourth generation programming language.
b. Frequent backup of files. c. Seventh generation programming language.
c. Downloading public-domain software from electronic bulletin d. Ninth generation programming language.
boards.
d. Installing original copies of purchased software on hard disk 55. Several language interfaces exist in a database management
drives. system. These typically include a data definition language (DDL), a
data control language (DCL), a data manipulation language (DML),
45. Which of the following is a risk that is higher when an electronic and a database query language (DQL). What language interface
funds transfer (EFT) system is used? would a database administrator use to establish the structure of
a. Improper change control procedures. database tables?
b. Unauthorized access and activity. a. DDL.
c. Insufficient online edit checks. b. DCL.
d. Inadequate backups and disaster recovery procedures. c. DML.
d. DQL.
46. The use of message encryption software
a. Guarantees the secrecy of data. 56. Users making database queries often need to combine several
b. Requires manual distribution of keys. tables to get the information they want. One approach to combining
c. Increases system overhead. tables is known as
d. Reduces the need for periodic password changes. a. Joining.
b. Merging.
**47. A company’s management is concerned about computer data c. Projecting.
eavesdropping and wants to maintain the confidentiality of its d. Pointing.
information as it is transmitted. The company should utilize
a. Data encryption. 57. User acceptance testing is more important in an object-oriented
b. Dial-back systems. development process than in a traditional environment because of
c. Message acknowledgement procedures. the implications of the
d. Password codes. a. Absence of traditional design documents.
b. Lack of a tracking system for changes.
48. Which of the following is likely to be a benefit of electronic data c. Potential for continuous monitoring.
interchange (EDI)? d. Inheritance of properties in hierarchies.
a. Increased transmission speed of actual documents.
b. Improved business relationships with trading partners. 58. A company's management has expressed concern over the
c. Decreased liability related to protection of proprietary business varied system architectures that the organization uses. Potential
data. security and control concerns would include all of the following
d. Decreased requirements for backup and contingency planning. except:
a. Users may have different user ID codes and passwords to
49. The internal auditor is reviewing a new policy on electronic mail. remember for the several systems that they use.
Appropriate elements of such a policy would include all of the b. There are difficulties in developing uniform security standards for
following except: the various platforms.
a. Erasing all employee’s electronic mail immediately upon c. Backup file storage administration is often decentralized.
employment termination. d. Having data distributed across many computers throughout the
b. Encrypting electronic mail messages when transmitted over organization increases the risk that a single disaster would destroy
phone lines. large portions of the organization’s data.
c. Limiting the number of electronic mail packages adopted by the
organization.

3
59. All of the following are methods for distributing a relational
database across multiple servers except: 68. Mill Co. uses a batch processing method to process its sales
a. Snapshot (making a copy of the database for distribution). transactions. Data on Mill’s sales transaction tape are electronically
b. Replication (creating and maintaining replica copies at multiple sorted by customer number and are subjected to programmed edit
locations). checks in preparing its invoices, sales journals, and updated
c. Normalization (separating the database into logical tables for customer account balances. One of the direct outputs of the
easier user processing). creation of this tape most likely would be a
d. Fragmentation (separating the database into parts and a. Report showing exceptions and control totals.
distributing where they are needed). b. Printout of the updated inventory records.
c. Report showing overdue accounts receivable.
60. Client/server architecture may potentially involve a variety of d. Printout of the sales price master file.
hardware, systems software, and application software from many
vendors. The best way to protect a client/server system from 69. Where disk files are used, the grandfather-father-son updating
unauthorized access is through backup concept is relatively difficult to implement because the
a. A combination of application and general access control a. Location of information points on disks is an extremely
techniques. time-consuming task.
b. Use of a commercially available authentication system. b. Magnetic fields and other environmental factors cause off-site
c. Encryption of all network traffic. storage to be impractical.
d. Thorough testing and evaluation of remote procedure calls. c. Information must be dumped in the form of hard copy if it is to be
reviewed before used in updating.
61. What technology is needed in order to convert a paper d. Process of updating old records is destructive.
document into a computer file?
a. Optical character recognition. **70. In a computerized system, procedure or problem-oriented
b. Electronic data interchange. language is converted to machine language through a(n)
c. Bar-coding scanning. a. Interpreter.
d. Joining and merging. b. Verifier.
c. Compiler.
62. Unauthorized alteration of online records can be prevented by d. Converter.
employing
a. Key verification. 71. Which of the following risks is not greater in an electronic funds
b. Computer sequence checks. transfer (EFT) environment than in a manual system using paper
c. Computer matching. transactions?
d. Database access controls. a. Unauthorized access and activity.
b. Duplicate transaction processing.
63. A manufacturer of complex electronic equipment such as c. Higher cost per transaction.
oscilloscopes and microscopes has been shipping its products with d. Inadequate backup and recovery capabilities.
thick paper manuals but wants to reduce the cost of producing and
shipping this documentation. Of the following, the best medium for 72. Methods to minimize the installation of unlicensed
the manufacturer to use to accomplish this is microcomputer software include all of the following except:
a. Write-once-read-many. a. Employee awareness programs.
b. Digital audio tape. b. Regular audits for unlicensed software.
c. Compact disc/read-only memory. c. Regular monitoring of network access and start-up scripts.
d. Computer-output-to-microform. d. An organizational policy that includes software licensing
requirements.
64. Misstatements in a batch computer system caused by incorrect
programs or data may not be detected immediately because 73. In traditional information systems, computer operators are
a. Errors in some transactions may cause rejection of other generally responsible for backing up software and data files on a
transactions in the batch. regular basis. In distributed or cooperative systems, ensuring that
b. The identification of errors in input data typically is not part of the adequate backups are taken is the responsibility of
program. a. User management.
c. There are time delays in processing transactions in a batch system. b. Systems programmers.
d. The processing of transactions in a batch system is not uniform. c. Data entry clerks.
d. Tape librarians.
65. Which of the following is not a characteristic of a batch
processed computer system? 74. An auditor is least likely to find that a client’s data is input
a. The collection of like transactions which are sorted and processed through
sequentially against a master file. a. Magnetic tape reader.
b. Keypunching of transactions, followed by machine processing. b. Dynamic linking character reader.
c. The production of numerous printouts. c. Point-of-sale recorders.
d. The posting of a transaction, as it occurs, to several files, without d. Touch sensitive screens.
intermediate printouts.
75. End-user computing is an example of which of the following?
66. Able Co. uses an online sales order processing system to process a. Client/server processing.
its sales transactions. Able’s sales data are electronically sorted and b. A distributed system.
subjected to edit checks. A direct output of the edit checks most c. Data mining.
likely would be a d. Decentralized processing.
a. Report of all missing sales invoices.
b. File of all rejected sales transactions. 76. End-user computing is most likely to occur on which of the
c. Printout of all user code numbers and passwords. following types of computers?
d. List of all voided shipping documents. a. Mainframe.
b. Minicomputers.
67. First Federal S & L has an online real-time system, with terminals c. Personal computers.
installed in all of its branches. This system will not accept a d. Personal reference assistants.
customer’s cash withdrawal instructions in excess of $1,000 without
the use of a “terminal audit key.” After the transaction is authorized 77. Which of the following statements is correct regarding the
by a supervisor, the bank teller then processes the transaction with Internet as a commercially viable network?
the audit key. This control can be strengthened by a. Organizations must use firewalls if they wish to maintain security
a. Online recording of the transaction on an audit override sheet. over internal
b. Increasing the dollar amount to $1,500. data.
c. Requiring manual, rather than online, recording of all such b. Companies must apply to the Internet to gain permission to create
transactions. a homepage
d. Using parallel simulation. to engage in electronic commerce.

4
c. Companies that wish to engage in electronic commerce on the b. Encryption controls may help to assure that messages are
Internet must meet required security standards established by the unreadable to unauthorized persons.
coalition of Internet providers. c. A value-added-network (VAN) must be used to assure proper
d. All of the above. control.
d. Attention must be paid to both the electronic and “paper”
78. To reduce security exposure when transmitting proprietary data versions of transactions.
over communication lines, a company should use 87. Which of the following statements most likely represents a
a. Asynchronous modems. disadvantage for an entity that keeps microcomputer-prepared data
b. Authentic techniques. files rather than manually prepared files?
c. Call-back procedures. a. Random error associated with processing similar transactions in
d. Cryptographic devices. different ways is usually greater.
b. It is usually more difficult to compare recorded accountability with
79. Securing client/server systems is a complex task because of all of physical count of assets.
the following factors except: c. Attention is focused on the accuracy of the programming process
a. The use of relational databases. rather than errors in individual transactions.
b. The number of access points. d. It is usually easier for unauthorized persons to access and alter the
c. Concurrent operation of multiple user sessions. files.
d. Widespread data access and update capabilities.
88. Which of the following is usually a benefit of transmitting
80. Which of the following would an auditor ordinarily consider the transactions in an electronic data interchange (EDI) environment?
greatest risk regarding an entity’s use of electronic data interchange a. A compressed business cycle with lower year-end receivables
(EDI)? balances.
a. Authorization of EDI transactions. b. A reduced need to test computer controls related to sales and
b. Duplication of EDI transmissions. collections transactions.
c. Improper distribution of EDI transactions. c. An increased opportunity to apply statistical sampling techniques
d. Elimination of paper documents. to account balances.
d. No need to rely on third-party service providers to ensure security.
81. Which of the following characteristics distinguish electronic data
interchange (EDI) from other forms of electronic commerce? 89. Which of the following is a network node that is used to improve
a. The cost of sending EDI transactions using a value-added network network traffic and to set up as a boundary that prevents traffic from
(VAN) is less than the cost of using the Internet. one segment to cross over to another?
b. Software maintenance contracts are unnecessary because a. Router.
translation software for EDI transactions need not be updated. b. Gateway.
c. EDI commerce is ordinarily conducted without establishing legally c. Firewall.
binding contracts between trading partners. d. Heuristic.
d. EDI transactions are formatted using strict standards that have
been agreed to worldwide. 90. Which of the following is an example of how specific controls in a
database environment may differ from controls in a nondatabase
82. Which of the following is considered a component of a local area environment?
network? a. Controls should exist to ensure that users have access to and can
a. Program flowchart. update only the data elements that they have been authorized to
b. Loop verification. access.
c. Transmission media. b. Controls over data sharing by diverse users within an entity should
d. Input routine. be the same for every user.
c. The employee who manages the computer hardware should also
83. Which of the following represents an additional cost of develop and debug the computer programs.
transmitting business transactions by means of electronic data d. Controls can provide assurance that all processed transactions are
interchange (EDI) rather than in a traditional paper environment? authorized, but cannot verify that all authorized transactions are
a. Redundant data checks are needed to verify that individual EDI processed.
transactions are not recorded twice.
b. Internal audit work is needed because the potential for random 91. A retail entity uses electronic data interchange (EDI) in executing
data entry errors is increased. and recording most of its purchase transactions. The entity’s auditor
c. Translation software is needed to convert transactions from the recognized that the documentation of the transactions will be
entity’s internal format to a standard EDI format. retained for only a short period of time. To compensate for this
d. More supervisory personnel are needed because the amount of limitation, the auditor most likely would
data entry is greater in an EDI system. a. Increase the sample of EDI transactions to be selected for cutoff
tests.
84. Many entities use the Internet as a network to transmit b. Perform tests several times during the year, rather than only at
electronic data interchange (EDI) transactions. An advantage of using year-end.
the Internet for electronic commerce rather than a traditional c. Plan to make a 100% count of the entity’s inventory at or near the
value-added network (VAN) is that the Internet year-end.
a. Permits EDI transactions to be sent to trading partners as d. Decrease the assessed level of control risk for the existence or
transactions occur. occurrence assertion.
b. Automatically batches EDI transactions to multiple trading
partners. 92. Which of the following is an encryption feature that can be used
c. Possesses superior characteristics regarding disaster recovery. to authenticate the originator of a document and ensure that the
d. Converts EDI transactions to a standard format without translation message is intact and has not been tampered with?
software. a. Heuristic terminal.
b. Perimeter switch.
85. Which of the following is not considered an exposure involved c. Default settings.
with electronic data interchange (EDI) systems as compared to other d. Digital signatures.
systems?
a. Increased reliance upon computer systems. 93.In building an electronic data interchange (EDI) system, what
b. Delayed transaction processing time. process is used to determine which elements in the entity’s
c. Possible loss of confidentiality of information. computer system correspond to the standard data elements?
d. Increased reliance upon third parties. a. Mapping.
b. Translation.
86. Which of the following statements is correct concerning internal c. Encryption.
control when a client is using an electronic data interchange system d. Decoding.
for its sales?
a. Controls should be established over determining that all suppliers 94. Which of the following passwords would be most difficult to
are included in the system. crack?

5
a. OrCa!FlSi
b. language
c. 12 HOUSE 24
d. pass56word

95. Which of the following is a password security problem?


a. Users are assigned passwords when accounts are created, but do
not change them.
b. Users have accounts on several systems with different passwords.
c. Users copy their passwords on note paper, which is kept in their
wallets.
d. Users select passwords that are not listed in any online dictionary.

96. Many of the Web 2.0 applications rely on an XML-based


application that facilitates the sharing and syndication of web
content, by subscription, Which of the applications below represents
this XML application?
a. Wiki.
b. Blog.
c. RSS/Atom Feeds.
d. Twitter.

D. Control Objectives for Information and Related Technology


(COBIT)

97. Which of the following is not one of the five principles of COBIT
5?
a. Meeting stakeholder needs.
b. Business processes.
c. Covering the enterprise end-to-end.
d. Applying a single integrated framework.

98. The Control Objectives for Information and Related Technology


(COBIT) framework has been established by:
a. The American Institute of Certified Public Accountants.
b. The Information Technology Institute.
c. The Information Systems Audit and Control Association.
d. The Committee of Sponsoring Organizations.

E. Effect of IT on Internal Control

99. Which of the following procedures would an entity most likely


include in its computer disaster recovery plan?
a. Develop an auxiliary power supply to provide uninterrupted
electricity.
b. Store duplicate copies of critical files in a location away from the
computer center.
c. Maintain a listing of entity passwords with the network manager.
d. Translate data for storage purposes with a cryptographic secret
code.

100. A company is concerned that a power outage or disaster could


impair the computer hardware’s ability to function as designed. The
company desires off-site backup hardware facilities that are fully
configured and ready to operate within several hours. The company
most likely should consider a
a. Cold site.
b. Cool site.
c. Warm site.
d. Hot site.

You might also like