You are on page 1of 1

14 1

University of San Agustin

AE 20 (Lec) / Accounting Information System/ MA 3-B


Submissions

Previous

Midterm Exam - AE20


Submissions 1 Instructions

Submissions
Here are your latest answers:

Question 1
The computer-to-computer exchange of business event data in structured or semi-
structured formats via Internet communication that allows the initiation and
consummation of business events.

Response: Internet commerce


Score: 2 out of 2

Question 2
This hacking technique sends out an e-mail pretending to be a legitimate business
asking for information about the user’s account.

Response: Phishing

Score: 2 out of 2

Question 3
It explains how a system works, including who, what, when, where, why, and how of
data entry, data processing, data storage, information output, and system controls

Response: Documentation

Score: 2 out of 2

Question 4
The data captured as business events unfold should be unsufficient for someone
who was not a party to the event to understand and reconstruct every relevant aspect
of what happened whether in accounting, marketing, human resources, financial
management, manufacturing, or any other part of the organization.
Response: False
Score: 2 out of 2

Question 5
The IS auditor should focus on the areas that are most meaningful to management.

Response: True

Score: 2 out of 2

Question 6
The following are the Basic components of Accounting Information System, except.

Response: Surge protectors

Score: 2 out of 2

Question 7
The computer programs used to store, retrieve, process, and analyze the company's
financial data.
Response: Software

Score: 2 out of 2

Question 8
A hacking technique where the hacker calls and request a password based on some
pretext?

Response: Smoozing

Score: 2 out of 2

Question 9
The principal responsibilities of a Help desk manager are to

Response: Oversee timely delivery of quality technical support service to both internal
and external clients, who have contracted technical support services.

Score: 2 out of 2

Question 10
An activities performed by the organization to transform inputs into outputs valued
by the customer.

Response: Value chain


Score: 2 out of 2

Question 11
An application controls audit examines and evaluates a number of data input,
processing and output control.

Response: True

Score: 2 out of 2

Question 12
It is a deliberate act or untruth intended to obtain unfair or unlawful gain.
Response: Fraud

Score: 0 out of 2

Question 13
It creates a public company accounting oversight board. Also prohibits audit firms
from providing design and implementation of financial systems.
Response: Sarbanes-Oxley Law
Score: 0 out of 2

Question 14
The advantages of Enterprise Systems, except.

Response: Centralized control versus decentralized empowerment


Score: 2 out of 2

Question 15
Which is not a basic function of event processing in the segregation of duties
control plan?

Response: Accounting Events

Score: 2 out of 2

Question 16
Which of the following is NOT included in data processing activities:

Response: Posting entries to Income Statement


Score: 2 out of 2

Question 17
The system contains the functions related to the sale of goods to customers and
includes recording a customer order, shipping goods to the customer, and billing the
customer.

Response: Sales and distribution

Score: 2 out of 2

Question 18
Which of the following is NOT a documentation tool?

Response: Business System Flowchart


Score: 2 out of 2

Question 19
Human Capital Management includes functions related to the recruitment,
management, profit and loss statement, payroll processing, and personnel training and
travel.
Response: False
Score: 2 out of 2

Question 20
What control plan ensures that erroneous data are corrected and resubmitted for
processing?

Response: Procedures for rejected inputs

Score: 0 out of 2

Question 21
An AIS contains confidential information belonging not just to the company but also
to its
employees and customers. This data may include, except.
Response: Customer billing statement

Score: 2 out of 2

Question 22
Which of the following is not a pervasive control?

Response: Monitoring Controls


Score: 0 out of 2

Question 23
Unauthorized, incomplete and incorrect data can result in correct financial data, and,
by implication, financial statements.

Response: False

Score: 2 out of 2

Question 24
The component of the system that stores the reports and ledgers

Response: Information storage

Score: 2 out of 2

Question 25
The aggregation of several business events over some period of time with the
subsequent processing of these data as a group by the information system.
Response: Batch processing

Score: 2 out of 2

Question 26
Controls at the business process level are a combination of manual controls
operated by the business and automated business and application controls.
Response: True

Score: 2 out of 2

Question 27
Identify the 8 components of Enterprise Risk Management

Response: Internal Environment


Response: Objective Setting

Response: Event Identification

Response: Risk Assessment

Response: Risk Response

Response: Control Activities

Response: Information and Communication


Response: Monitoring

Score: 8 out of 8

Question 28
The transformation from physical value chain to a virtual value chain generates
three potential market opportunities for companies, which is not included.

Response: Facilitates the functioning of the organization’s operations

Score: 2 out of 2

Question 29
Which aspects of the personnel management control plan layout the responsibilities
for each class on an organization chart and identify the resources for performing those
responsibilities?

Response: Job description control plans

Score: 2 out of 2

Question 30
An accounting information system(AIS) is a structure that a business uses to
collect, store,
manage, process, retrieve, and report its financial data.

Response: True

Score: 2 out of 2

Question 31
It is one of the basic elements of a data flow diagram where the storage of data or
the
endpoint of the particular data is represented by two horizontal lines where the bottom
line is bold.

Response: Data Store symbol

Score: 2 out of 2

Question 32
Business-to-consumer is the electronic trading between business and individual
customer.

Response: True

Score: 2 out of 2

Question 33
Business process and application controls are directly related to individual
computerized applications.
Response: True

Score: 2 out of 2

Question 34
Most business processes are automated and integrated with IT application systems,
resulting in many of the controls at this level being automated as well. These controls
are known as application controls.

Response: True

Score: 2 out of 2

Question 35
To examine the role that enterprise systems play in the success of an organization,
you can look at the activities performed by the organization as a value chain.

Response: True

Score: 2 out of 2

Question 36
The electronic transactions are done between businesses or organizations.

Response: True

Score: 2 out of 2

Question 37
What program code can attach itself to other programs (including macros within
word processing documents), thereby “infecting” those programs and macros?

Response: Computer virus

Score: 2 out of 2

Assignment
Type: Quiz
Max score: 80

Category: Summative Test

Start: Oct 21, 9:00 am

Due: Oct 21, 11:00 am

No more submissions are allowed

Score
Your best submission is used

72/80 (90%)

Submission
Submitted: Oct 21, 10:04 am
Time taken: 38 m, 54 s.
Attempts: 1
Max. attempts: 1
Allow late submissions:

Comments
Submission 1 @ 10:04 am Oct 21, 2022

       

Post

Previous

University Website Contact

You might also like