Ais Quizzes Accounting Information System Chapter Quiz - Compress
Ais Quizzes Accounting Information System Chapter Quiz - Compress
Accounting (ACT101)
1. The documentation skills that accountants require vary with their job function. However, they should at least be able
to do which of the following?
a. Read documentation to determine how the system works.
b. Critique and correct documentation that others prepare.
c. Prepare documentation for a newly developed information system.
d. Teach others how to prepare documentation.
2. It explains how a system works, including the who, what, why, when, and where of systems.
a. Documents
b. Flowcharts
c. Documentation
d. Diagrams
4. It uses a pictorial representation to make it easier to understand and explain using a standard set of symbols.
a. Input and Output
b. Symbols
c. Document
d. Flowcharts
5. What act was enacted in 2002 that requires management to assess internal controls and auditors to evaluate the
assessment?
a. Credit Information System Act
b. Sarbanes-Oxley Act
c. Electronic Commerce Act
d. Sorley-Oxbey Act
0 0
6. A written, step-by-step explanation of system components and how they interact.
a. Documentation
b. Description
c. Descriptive Description
d. Narrative Description
7. A type of flowchart that shows the relationship among the input, processing, and output in an information system.
a. System flowchart
b. Program flowchart
c. Internal Control flowchart
d. Document flowchart
8. A graphical description of the flow of data within an organization, including data sources/destinations, data flows,
transformation processes, and data storage.
a. Data transformation
b. Context Diagram
c. Data Flow Diagram
d. Business Process Diagram
10. Which of the following flowcharts shows the flow of document and information between departments or areas of
responsibility?
a. System flowchart
b. Program flowchart
c. Documentation flowchart
d. Document flowchart
0 0
12. What does the circle on a business process diagram represent?
a. Start/Begin
b. Flow
c. Decision
d. Annotation Information
13. The data flow diagram symbol which represents data flows is the
a. Triangle
b. Circle
c. Line
d. Arrow
14. These are the guidelines for preparing Business Process Diagrams (BPD), except one of the following.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. All of the following are guidelines for BPD.
15. Choose among the following is included in the guidelines for preparing flowcharts.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. None of the above choices.
17. A system flowchart depicts the relationship among system input, processing, storage, and ____.
a. Computer
b. Technology
c. Output
d. Program
0 0
18. How do flowcharts are represented?
a. By a narrative information
b. By a symbolic shape
c. By a functions
d. By a page
e1. ____ is a primary key (PK) that uniquely identifies each record in the file.
b. Pre-printed number
c. Inventory Number
d. Account Number
2. It records the essential details and prepares multiple copies of sales order, which are held for pending approvals.
a. Shipping Department
b. Sales Department
0 0
d. Warehouse Procedures
3. It is where the clerk reconciles checks and remittance list and prepare deposit slips.
a. Mail Room
d. AR Department
4. This is to reduce the amount of accounting mistakes but more commonly to reduce the incidence of fraud.
a. Segregation of Duties
b. Transaction Authorization
c. Access Control
d. Supervision
b. Physical Systems
c. Cash Flows
a. Reengineering
b. Interactive System
c. Automation
d. Manual System
0 0
7. In what procedure do clerks terminal immediately produces a hard-copy printout of the electronically transmitted
stock release document?
a. Sales Procedures
b. Shipping Procedures
d. Warehouse Procedures
8. It is a recurring set of business activities and related information processing operation associated with providing
goods and services to a customer and the collection of cash and payment for those sales.
b. Physical Systems
c. Cash Flow
d. Revenue Cycle
9. It is a shipment receipt when the carrier delivers the goods at a predetermined destination.
a. Shipping Department
b. Shipping Procedures
c. Bill of Lading
d. Warehouse Procedures
10. Both are secondary key (SK) that is neither uniquely identifies sales order records.
0 0
11. It is where the clerk receives and reconciles the remittance advices and list.
a. Mail Room
d. AR Department
12. It is where the clerk separates the checks and remittance advices and prepares a remittance list.
a. Mail Room
d. AR Department
13. The primary objective of revenue cycle is to provide the right product in a place at the right time for the right price. T
15. If credit is approved, the sales department releases copies of the sales order to the billing, warehouse and shipping
department. T
16. One of the advantages of Reengineering with Real- time Technology is. it reduces the amount of paper documents in
the system. T
17. Remittance advices and list must be sent to Cash Receipts Department. F
18. When contents of cash drawer have been reconciled, cash receipts clerk prepares a cash reconciliation form, the first
copy must be recorded to the cash receipts journal.F
0 0
19. Reengineering using the internet connects to thousands of potential business partners with formal agreement. F
20. Under the Cash Receipts Department, clerk prepares the journal voucher of total cash received.T
1. What are the five principles that the reliable system satisfies?
A. Security, Access control, Confidentiality, Privacy, Availability
b. Security, Confidentiality, Privacy, Process integrity, Availability
c. Security, Intellectual property, Access control, Privacy, Confidentiality
d. Security, Confidentiality, Privacy, Process integrity, Encryption
Privacy
Availability
Security
Access control
5.) Manner in which key and text is combined to create scrambled text
A. Key length
B. Privacy
0 0
C. Policies concerning encryption keys
D. Algorithm
6.) It is the number of bits (characters) used to convert text into blocks
A. Key length
B. Privacy
C. Policies concerning encryption keys
d. Algorithm
7.) A type of encryption which uses two keys and can create digital signatures
A. Symmetric
B. Asymmetric
C. Hybrid Solution
d. Hashing
8.) A type of encryption which uses one key to encrypt & decrypt
Symmetric
Asymmetric
Hybrid Solution
Hashing
9.) Hash of document that is encrypted using document creator’s private key
Digital Signature
Hashing
Hybrid Solution
Digital Certificate
0 0
11.) It is the correctness of logical relationship between two data items.
Key Verification
Check digit verification
Reasonableness Test
Validity check
12.) Checks accuracy of input data by using it to retrieve and display other related information.
Prompting
Closed-loop verification
Transaction logs
Automatic data entry
13.) Threats to system availability originate from the following sources, except:
14.) When using batch processing, the following data entry controls should be incorporated, except:
Transaction logs
Sequence check
Error log
d. Batch totals
15.) Range check tests numerical amount against lower and upper limits. T
16.) Completeness check requires entering key data in twice to verify its accuracy. F
17.) Digital certificate is an electronic document that contains an entity’s public key and certifies the identity of the
owner of that particular public key. T
0 0
18.) The following regulations require organizations to protect the privacy of customer information, except: Health
Issurance Possibility and Accounting Act (HIPAA)
19.) The unauthorized use of someone’s personal information for the perpetrator’s benefit.- identity theft
20.) The common number of bits (characters) used to convert text into blocks - 256
2. Is a system that composed of people and computers that processes or interprets information.
Computerized Information System
Accounting System
Transactions
Auditing
3. A process effected by an entity’s board of directors, management and other personnel, designed to provide
reasonable assurance of the achievement of objectives.
IPO model
Accounting model
COSO model
Audit risk model
5. Accounting _____ events systematically to produce reports for the users of the information.
Audits
0 0
Records
Journalizes
Summarizes
7. Economic and efficient use of resources and the accomplishment of established goals and objectives.
Compliance audit
Financial Audit
Internal Audit
Operational Audit
8. Is a multi-disciplinary study.
Auditing in a CIS Environment
Accounting
Transactions
CIS
9. Examines the reliability and integrity of financial transactions, accounting records, and financial statements.
Compliance audit
Financial Audit
Internal Audit
Operational Audit
0 0
11. It is the organizational plan and all related measures to safeguard assets, ensure the accuracy and reliability of
accounting records, promote operational efficiency, and encourage adherence to prescribed managerial policies.
IPO model
Accounting model
COSO model
Internal control
12. the systematic process of obtaining and evaluating evidence regarding assertion about economic actions and events
in order to determine how well they correspond with established criteria.
Validity
Auditing
Reliability
Honesty
13. Is a widely used approach in systems analysis and software engineering for describing the structure of an
information processing program or another process.
IPO model
Accounting model
COSO model
Internal control
14. Compliance Audit determines whether entities are complying with applicable laws, regulations, policies, and
procedures. T
15. Financial Audit examines the reliability and integrity of financial transactions, accounting records, and financial
statements. T
16. Instances that may be outside the control of processors are the following, except;
Information theft
Computer fraud
Information abuse
None of these
0 0
Honesty
None of these
19. Is the process of understanding the IT environment, to identify the related IT risks in order to perform appropriate
audit procedures to achieve that ‘assurance’ needed.
Computerized Information System
Accounting
Transactions
Auditing in a CIS Environment
20. The following are the advantages of E-commerce & Electronic Fund Transfers, except;
Convenience
Time consuming
Immediate Payment
Real-time Processing
It is an organized collection of structured information, or data, typically stored electronically in a computer system.
a) Database
b) Data dictionary
c) Logical
d) Database system
0 0
a) Physical
b) Logical
c) Data dictionary
d) Database
a) Peripheral view
b) Conceptual view
c) Point of view
d) Data view
_______”blueprint” of the structure of database and includes data elements, field types, programs, output, etc.
a) Data Dictionary
b) Database management system
c) Database
d) Database system
a) Data Definition Language, Data Manipulation Language, and Data Query Language
0 0
b) Data Definition Language, Database Management Language, and Data Query Language
c) Data Definition Language, Data Manipulation Language, and Data Management Language
d) Database Definition Language, Data Manipulation Language, and Data Query Language
It is a software package designed to define, manipulate, retrieve and manage data in a database.
a) DBMS
b) DDL
c) DML
d) DQL
a) Insert
b) Select
c) Delete
d) Caps Lock
It enables users to retrieve, sort, and display specific data from database
a) DQL
b) DML
c) DBMS
d) DDL
a) TRUE
b) FALSE
It represents the conceptual and external schema as if that “data view” were truly stored in one table.
a) Relational Database
b) Relationship Database
c) Relational Data
d) Relationship Data
Data stored in on large table can be redundant and inefficient causing the following problems except:
a) Update anomaly
0 0
b) Insert anomaly
c) Delete anomaly
d) Control anomaly
a) Triple
b) Double
c) Single
d) Quadruple
Users may want specific information found in a relational database and not have to sort through all the files to get that
information. So they ______ (ask a question) the data.
a) Query
b) Answer
c) Invoice
d) Research
a) TRUE
b) FALSE
a) Physical
b) Logical
c) Data dictionary
d) Database management
1. It is a false representation of a material fact made by one party to another party with the intent to deceive and
to induce the other party to rely on the fact to his or her detriment.
a) Swindling
b) Deception
c) Fraud
d) Concealment
0 0
2. In the fraud triangle, it is the only component that a company exercises complete control over.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization
3. A type of fraud that is committed at higher levels usually by Chiefs Executive Officer and Chief Financial Officer.
a) Customer Fraud
b) Management Fraud
c) Vendor Fraud
d) Employee Fraud
4. Below are the example of things that provide incentives for committing fraud, except:
a) Poor tone at the top
b) Personal incentives
c) Bonuses based on a financial metric
d) Investor and analyst expectations
5. Which of the following belongs to the external sources of computer fraud?
a) Skimming
b) Larceny
c) Spoofing
d) Kickback
6. The following are policies to assist in the avoidance of fraud and errors, except:
a) System of Accounting Internal Control
b) System of Information Technology Controls
c) System of Accounting External Control
d) Code of Ethics
7. Its purpose is to inform those acting on behalf of the organization on how they should conduct themselves.
a) Stewardship Obligation
b) Code of Ethics
c) Computer Ethics
d) Internal controls
8. It refers to an employee’s mindset towards committing fraud.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization
9. (Blank) are everything your organization owns including money, money owed to you, equipment, goods,
property or lands, etc.
a) Property
b) Asset
c) Equity
d) None of the above.
10. It refers to the careful and responsible management of something entrusted to one’s care.
a) Leadership
b) Regulation
c) Stewardship
d) Supervision
11. These are the objectives of internal control; except:
a) Reliability of Financial reporting
0 0
b) Effectiveness and Efficiency of operations.
c) Compliance with Management Directives
d) Compliance with Applicable Laws and Regulations
12. This act also added new criminal penalties for violating securities laws.
a) Act of 2002
b) Act of 2001
c) Act of 2004
d) Act of 2003
13. It is the analysis of the impact of computer technology and the policies for the ethical use of such technology.
a) Code of Ethics
b) Pop Ethics
c) Para Ethics
d) Computer Ethics
14. It is a multidisciplinary application of ethical theories to computer science.
a) Para Ethics
b) Pop Ethics
c) Theoretical Ethics
d) Theories of Ethics
15. Ethical behavior is a necessary and a sufficient condition for business success in the long run.
a) True
b) False
16. This pertains to the principles of conduct that individuals and business manager use in guiding their behavior
and choices.
a) Business Ethics
b) Behavioral Ethics
c) Code of Ethics
d) Decision Ethics
17. These are the four areas of ethics in business, except:
a) Equity
b) Exercise of corporate power
c) Rights
d) Obligations
18. The purpose of a code of ethics is to ______ those acting on behalf of the organization on how they should
conduct themselves.
a) Affirm
b) Inform
c) Guide
d) Check
19. One of the levels of computer ethics where one should have real interest and acquire some skill and knowledge
in the field.
a) Pop Ethics
b) Para Ethics
c) Pare Ethics
d) Paria Ethics
20. A type of customer fraud.
a) Credit card fraud
b) Vendor Audits
c) Cash Fraud
d) Dos Attacks
0 0
1. Upon receipt of the supplier’s invoice, Accounts Payable reconciles all documents, posts to the purchases
journal, and records the _______ in the accounts payable subsidiary ledger.
a. asset
b. liability
c. equity
d. income
2. A clerk prepares a purchase requisition and sends copies to Purchasing and Accounts Payable.
a. True
b. False
3. To what departments do Purchasing department prepares and sends copies of purchase order for each
vendor?
a. Inventory control, Accounts Payable, Receiving (blind copy), and Purchasing Department
b. Purchasing Department, Receiving (blind copy), and Accounts Payable
c. Accounts Payable, Purchasing Department, the vendor and Inventory Control
d. Inventory Control, Accounts Payable, Receiving (blind copy), and the vendor.
4.The Accounts Payable department has now sent copies of the purchase requisition, purchase order, and
receiving report.
a. False
b. True
5. Periodically, the entries in the purchases journal are summarized in a _______ which is sent to the General
Ledger department.
a. Journal voucher
b. General ledger
c. Purchases journal
d. cash disbursements voucher
7. General Ledger also prepares a cash disbursements voucher and posts it in the voucher register.
a. True
b. False
8. The General Ledger department posts from the accounts payable journal voucher to the general ledger.
a. False
b. True
9. The Accounts Payable Department prepares the checks and returns paid vouchers to accounts payable, mails
the check to the supplier.
a. True
b. False
0 0
11. It is the organizational plan and all related measures to safeguard assets, ensure the accuracy and reliability
accounting records, promote operational efficiency, and encourage adherence to prescribed managerial policies.
IPO model
Accounting model
COSO model
Internal control
12. the systematic process of obtaining and evaluating evidence regarding assertion about economic actions and eve
in order to determine how well they correspond with established criteria.
Validity
Auditing
Reliability
Honesty
13. Is a widely used approach in systems analysis and software engineering for describing the structure of
information processing program or another process.
IPO model
Accounting model
COSO model 0 0
Internal control
14. Compliance Audit determines whether entities are complying with applicable laws, regulations, policies, a
procedures. T
15. Financial Audit examines the reliability and integrity of financial transactions, accounting records, and financ
statements. T
16. Instances that may be outside the control of processors are the following, except;
Information theft
Computer fraud
Information abuse
None of these
0 0