0% found this document useful (0 votes)
139 views

Ais Quizzes Accounting Information System Chapter Quiz - Compress

The document provides a quiz on system documentation techniques covered in an accounting information systems chapter. It contains 20 multiple choice questions testing understanding of topics like flowcharts, data flow diagrams, the revenue cycle, and system documentation guidelines. The key topics covered are documentation skills accountants require, flowchart symbols and uses, the Sarbanes-Oxley Act, and guidelines for preparing various types of diagrams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views

Ais Quizzes Accounting Information System Chapter Quiz - Compress

The document provides a quiz on system documentation techniques covered in an accounting information systems chapter. It contains 20 multiple choice questions testing understanding of topics like flowcharts, data flow diagrams, the revenue cycle, and system documentation guidelines. The key topics covered are documentation skills accountants require, flowchart symbols and uses, the Sarbanes-Oxley Act, and guidelines for preparing various types of diagrams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

AIS-Quizzes - Accounting Information System Chapter Quiz

Accounting (ACT101)

AIS CHAPTER 3 QUIZ


SYSTEM DOCUMENTATION TECHNIQUES

1. The documentation skills that accountants require vary with their job function. However, they should at least be able
to do which of the following?
a. Read documentation to determine how the system works.
b. Critique and correct documentation that others prepare.
c. Prepare documentation for a newly developed information system.
d. Teach others how to prepare documentation.

2. It explains how a system works, including the who, what, why, when, and where of systems.
a. Documents
b. Flowcharts
c. Documentation
d. Diagrams

3. These are the basic elements of a Data Flow Diagram, except:


a. Data Store
b. Process
c. Data Connection
d. Data Flow

4. It uses a pictorial representation to make it easier to understand and explain using a standard set of symbols.
a. Input and Output
b. Symbols
c. Document
d. Flowcharts

5. What act was enacted in 2002 that requires management to assess internal controls and auditors to evaluate the
assessment?
a. Credit Information System Act
b. Sarbanes-Oxley Act
c. Electronic Commerce Act
d. Sorley-Oxbey Act

0 0
6. A written, step-by-step explanation of system components and how they interact.
a. Documentation
b. Description
c. Descriptive Description
d. Narrative Description

7. A type of flowchart that shows the relationship among the input, processing, and output in an information system.
a. System flowchart
b. Program flowchart
c. Internal Control flowchart
d. Document flowchart

8. A graphical description of the flow of data within an organization, including data sources/destinations, data flows,
transformation processes, and data storage.
a. Data transformation
b. Context Diagram
c. Data Flow Diagram
d. Business Process Diagram

9. Which of the following statements is incorrect?


a. A flowchart is an analytical technique used to describe some aspect of an information system.
b. A flowchart uses a standard set of symbols to describe pictorially some aspect of an information system.
c. A flowchart is drawn using a software program such as Excel, Word, or PowerPoint.
d. A flowchart is a narrative representation of an information system.

10. Which of the following flowcharts shows the flow of document and information between departments or areas of
responsibility?
a. System flowchart
b. Program flowchart
c. Documentation flowchart
d. Document flowchart

11. Which function does the rectangle symbol represent in a flowchart?


a. Manual Operation
b. Database
c. Computer Processing
d. Journal or Ledger

0 0
12. What does the circle on a business process diagram represent?
a. Start/Begin
b. Flow
c. Decision
d. Annotation Information

13. The data flow diagram symbol which represents data flows is the
a. Triangle
b. Circle
c. Line
d. Arrow

14. These are the guidelines for preparing Business Process Diagrams (BPD), except one of the following.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. All of the following are guidelines for BPD.

15. Choose among the following is included in the guidelines for preparing flowcharts.
a. Ignore certain items
b. Organize diagram
c. Identify business process
d. None of the above choices.

16. It is a visual way to represent the activities in a business process.


a. Business Process Diagram
b. Data Flow Diagram
c. Pyramid Diagram
d. Transaction Diagram

17. A system flowchart depicts the relationship among system input, processing, storage, and ____.
a. Computer
b. Technology
c. Output
d. Program

0 0
18. How do flowcharts are represented?
a. By a narrative information
b. By a symbolic shape
c. By a functions
d. By a page

19. Our main topic for today’s discussion is


a. Symbolic Documentation Techniques
b. System Documents Techniques
c. Systematic Techniques
d. Systems Documentation Techniques

20. Which one is not included in our topic's learning objectives?


a. Prepare and use DFD
b. Prepare and use flowcharts
c. Prepare and use input/output
d. Prepare and use BPD

e1. ____ is a primary key (PK) that uniquely identifies each record in the file.

a. Sales Order Number

b. Pre-printed number

c. Inventory Number

d. Account Number

2. It records the essential details and prepares multiple copies of sales order, which are held for pending approvals.

a. Shipping Department

b. Sales Department

c. Credit Department Approval

0 0
d. Warehouse Procedures

3. It is where the clerk reconciles checks and remittance list and prepare deposit slips.

a. Mail Room

b. Data Processing Department

c. Cash Receipts Department

d. AR Department

4. This is to reduce the amount of accounting mistakes but more commonly to reduce the incidence of fraud.

a. Segregation of Duties

b. Transaction Authorization

c. Access Control

d. Supervision

5. Which is not a part of revenue cycle?

a. Revenue Cycle Activities

b. Physical Systems

c. Cash Flows

d. Revenue Cycle Controls

6. It involves using technology to improve the efficiency and effectiveness of a task.

a. Reengineering

b. Interactive System

c. Automation

d. Manual System

0 0
7. In what procedure do clerks terminal immediately produces a hard-copy printout of the electronically transmitted
stock release document?

a. Sales Procedures

b. Shipping Procedures

c. Sales Order Procedures

d. Warehouse Procedures

8. It is a recurring set of business activities and related information processing operation associated with providing
goods and services to a customer and the collection of cash and payment for those sales.

a. Revenue Cycle Activities

b. Physical Systems

c. Cash Flow

d. Revenue Cycle

9. It is a shipment receipt when the carrier delivers the goods at a predetermined destination.

a. Shipping Department

b. Shipping Procedures

c. Bill of Lading

d. Warehouse Procedures

10. Both are secondary key (SK) that is neither uniquely identifies sales order records.

a. Account Number and Inventory Number

b. Account Number and Sales Order Number

c. Inventory Number and Sales Number

d. Inventory Number and Sales Order Number

0 0
11. It is where the clerk receives and reconciles the remittance advices and list.

a. Mail Room

b. Data Processing Department

c. Cash Receipts Department

d. AR Department

12. It is where the clerk separates the checks and remittance advices and prepares a remittance list.

a. Mail Room

b. Data Processing Department

c. Cash Receipts Department

d. AR Department

13. The primary objective of revenue cycle is to provide the right product in a place at the right time for the right price. T

14. Account number is a pre-printed number on physical source documents. F

15. If credit is approved, the sales department releases copies of the sales order to the billing, warehouse and shipping
department. T

16. One of the advantages of Reengineering with Real- time Technology is. it reduces the amount of paper documents in
the system. T

17. Remittance advices and list must be sent to Cash Receipts Department. F

18. When contents of cash drawer have been reconciled, cash receipts clerk prepares a cash reconciliation form, the first
copy must be recorded to the cash receipts journal.F

0 0
19. Reengineering using the internet connects to thousands of potential business partners with formal agreement. F

20. Under the Cash Receipts Department, clerk prepares the journal voucher of total cash received.T

1. What are the five principles that the reliable system satisfies?
A. Security, Access control, Confidentiality, Privacy, Availability
b. Security, Confidentiality, Privacy, Process integrity, Availability
c. Security, Intellectual property, Access control, Privacy, Confidentiality
d. Security, Confidentiality, Privacy, Process integrity, Encryption

2.) It protects information in transit and in storage

A. Identify & classify information to protect


B. Encryption
C. Access controls
D. Training

3.) It is a principle which has the same control as confidentiality

Privacy
Availability
Security
Access control

4.) The following are the privacy concerns, except


A. SPAM
B. Organizations must carefully follow the CAN-SPAM guidelines
C. Identify Theft
D. Identification and classification

5.) Manner in which key and text is combined to create scrambled text
A. Key length
B. Privacy

0 0
C. Policies concerning encryption keys
D. Algorithm

6.) It is the number of bits (characters) used to convert text into blocks
A. Key length
B. Privacy
C. Policies concerning encryption keys
d. Algorithm

7.) A type of encryption which uses two keys and can create digital signatures
A. Symmetric
B. Asymmetric
C. Hybrid Solution
d. Hashing

8.) A type of encryption which uses one key to encrypt & decrypt

Symmetric
Asymmetric
Hybrid Solution
Hashing

9.) Hash of document that is encrypted using document creator’s private key
Digital Signature
Hashing
Hybrid Solution
Digital Certificate

10. ) If data is encrypted before sending it, a _____ is created.

Virtual Private Network (VPN)


Hybrid Solution
Public Key Infrastructure (PKI)
Digital certificate

0 0
11.) It is the correctness of logical relationship between two data items.

Key Verification
Check digit verification
Reasonableness Test
Validity check

12.) Checks accuracy of input data by using it to retrieve and display other related information.

Prompting
Closed-loop verification
Transaction logs
Automatic data entry

13.) Threats to system availability originate from the following sources, except:

Hardware and Software failures


Natural and man-made disasters
Human error
Cross-footing

14.) When using batch processing, the following data entry controls should be incorporated, except:

Transaction logs
Sequence check
Error log
d. Batch totals

15.) Range check tests numerical amount against lower and upper limits. T

16.) Completeness check requires entering key data in twice to verify its accuracy. F

17.) Digital certificate is an electronic document that contains an entity’s public key and certifies the identity of the
owner of that particular public key. T

0 0
18.) The following regulations require organizations to protect the privacy of customer information, except: Health
Issurance Possibility and Accounting Act (HIPAA)

19.) The unauthorized use of someone’s personal information for the perpetrator’s benefit.- identity theft

20.) The common number of bits (characters) used to convert text into blocks - 256

1. It is the process of recording financial transactions pertaining to a business.


Auditing
Accounting
Posting
Journalizing

2. Is a system that composed of people and computers that processes or interprets information.
Computerized Information System
Accounting System
Transactions
Auditing

3. A process effected by an entity’s board of directors, management and other personnel, designed to provide
reasonable assurance of the achievement of objectives.
IPO model
Accounting model
COSO model
Audit risk model

4. A situation involving exposure to danger.


Risks
Internal control
Fraud
Error

5. Accounting _____ events systematically to produce reports for the users of the information.
Audits

0 0
Records
Journalizes
Summarizes

6. Complete, honest and fair information.


Validity
Integrity
Reliability
Honesty

7. Economic and efficient use of resources and the accomplishment of established goals and objectives.
Compliance audit
Financial Audit
Internal Audit
Operational Audit

8. Is a multi-disciplinary study.
Auditing in a CIS Environment
Accounting
Transactions
CIS

9. Examines the reliability and integrity of financial transactions, accounting records, and financial statements.
Compliance audit
Financial Audit
Internal Audit
Operational Audit

10. Well-grounded, just and relevant.


Validity
Integrity
Reliability
Honesty

0 0
11. It is the organizational plan and all related measures to safeguard assets, ensure the accuracy and reliability of
accounting records, promote operational efficiency, and encourage adherence to prescribed managerial policies.
IPO model
Accounting model
COSO model
Internal control

12. the systematic process of obtaining and evaluating evidence regarding assertion about economic actions and events
in order to determine how well they correspond with established criteria.
Validity
Auditing
Reliability
Honesty

13. Is a widely used approach in systems analysis and software engineering for describing the structure of an
information processing program or another process.
IPO model
Accounting model
COSO model
Internal control

14. Compliance Audit determines whether entities are complying with applicable laws, regulations, policies, and
procedures. T

15. Financial Audit examines the reliability and integrity of financial transactions, accounting records, and financial
statements. T

16. Instances that may be outside the control of processors are the following, except;
Information theft
Computer fraud
Information abuse
None of these

17. Objectives of Audit in Computerized Information includes the following, except;


Integrity
Reliabilty

0 0
Honesty
None of these

18. Examples of raw data are the following, except;


Assets
Liability
Income
Retained Earnings

19. Is the process of understanding the IT environment, to identify the related IT risks in order to perform appropriate
audit procedures to achieve that ‘assurance’ needed.
Computerized Information System
Accounting
Transactions
Auditing in a CIS Environment

20. The following are the advantages of E-commerce & Electronic Fund Transfers, except;
Convenience
Time consuming
Immediate Payment
Real-time Processing

It is an organized collection of structured information, or data, typically stored electronically in a computer system.

a) Database
b) Data dictionary
c) Logical
d) Database system

These are the advantages of database except:

a) Improved data security


b) Reduced updating errors and increased consistency
c) Damage to database affects virtually all applications programs
d) Greater data integrity and independence from applications programs

It determines if all the requirements of the business have been gathered.

0 0
a) Physical
b) Logical
c) Data dictionary
d) Database

What does DBMS stands for?

a) Data management system


b) Data manipulation system
c) Database management system
d) Database manipulation system

These are the disadvantages of database except:

a) Initial training required for all programmers and users


b) Substantial hardware and software start-up costs
c) Damage to database affects virtually all applications programs
d) Greater data integrity and independence from applications programs

This is usually controlled by a database management system.

a) Data Definition Language


b) Database
c) Data dictionary
d) Logical

In designing a database, one must have a _________ of the entire database.

a) Peripheral view
b) Conceptual view
c) Point of view
d) Data view

_______”blueprint” of the structure of database and includes data elements, field types, programs, output, etc.

a) Data Dictionary
b) Database management system
c) Database
d) Database system

What are the three DBMS languages?

a) Data Definition Language, Data Manipulation Language, and Data Query Language

0 0
b) Data Definition Language, Database Management Language, and Data Query Language
c) Data Definition Language, Data Manipulation Language, and Data Management Language
d) Database Definition Language, Data Manipulation Language, and Data Query Language

It is a software package designed to define, manipulate, retrieve and manage data in a database.

a) DBMS
b) DDL
c) DML
d) DQL

Data Manipulation Language (DML) used the following commands except:

a) Insert
b) Select
c) Delete
d) Caps Lock

It enables users to retrieve, sort, and display specific data from database

a) DQL
b) DML
c) DBMS
d) DDL

Data Manipulation Language do not change the content in the database

a) TRUE
b) FALSE

It represents the conceptual and external schema as if that “data view” were truly stored in one table.

a) Relational Database
b) Relationship Database
c) Relational Data
d) Relationship Data

Data stored in on large table can be redundant and inefficient causing the following problems except:

a) Update anomaly

0 0
b) Insert anomaly
c) Delete anomaly
d) Control anomaly

In relational database design rules, every column in a row must be _______valued

a) Triple
b) Double
c) Single
d) Quadruple

Users may want specific information found in a relational database and not have to sort through all the files to get that
information. So they ______ (ask a question) the data.

a) Query
b) Answer
c) Invoice
d) Research

Reduced data redundancy is one of the advantages of database.

a) TRUE
b) FALSE

What DBMS Language displays the “primary keys”?

a) Data Query Language


b) Data Quality Language
c) Data Definition Language
d) Data Manipulation Language

It deals with how the data will be stored in the database.

a) Physical
b) Logical
c) Data dictionary
d) Database management
1. It is a false representation of a material fact made by one party to another party with the intent to deceive and
to induce the other party to rely on the fact to his or her detriment.
a) Swindling
b) Deception
c) Fraud
d) Concealment

0 0
2. In the fraud triangle, it is the only component that a company exercises complete control over.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization

3. A type of fraud that is committed at higher levels usually by Chiefs Executive Officer and Chief Financial Officer.
a) Customer Fraud
b) Management Fraud
c) Vendor Fraud
d) Employee Fraud
4. Below are the example of things that provide incentives for committing fraud, except:
a) Poor tone at the top
b) Personal incentives
c) Bonuses based on a financial metric
d) Investor and analyst expectations
5. Which of the following belongs to the external sources of computer fraud?
a) Skimming
b) Larceny
c) Spoofing
d) Kickback
6. The following are policies to assist in the avoidance of fraud and errors, except:
a) System of Accounting Internal Control
b) System of Information Technology Controls
c) System of Accounting External Control
d) Code of Ethics
7. Its purpose is to inform those acting on behalf of the organization on how they should conduct themselves.
a) Stewardship Obligation
b) Code of Ethics
c) Computer Ethics
d) Internal controls
8. It refers to an employee’s mindset towards committing fraud.
a) Incentive
b) Attitude
c) Opportunity
d) Rationalization
9. (Blank) are everything your organization owns including money, money owed to you, equipment, goods,
property or lands, etc.
a) Property
b) Asset
c) Equity
d) None of the above.
10. It refers to the careful and responsible management of something entrusted to one’s care.
a) Leadership
b) Regulation
c) Stewardship
d) Supervision
11. These are the objectives of internal control; except:
a) Reliability of Financial reporting

0 0
b) Effectiveness and Efficiency of operations.
c) Compliance with Management Directives
d) Compliance with Applicable Laws and Regulations
12. This act also added new criminal penalties for violating securities laws.
a) Act of 2002
b) Act of 2001
c) Act of 2004
d) Act of 2003
13. It is the analysis of the impact of computer technology and the policies for the ethical use of such technology.
a) Code of Ethics
b) Pop Ethics
c) Para Ethics
d) Computer Ethics
14. It is a multidisciplinary application of ethical theories to computer science.
a) Para Ethics
b) Pop Ethics
c) Theoretical Ethics
d) Theories of Ethics
15. Ethical behavior is a necessary and a sufficient condition for business success in the long run.
a) True
b) False
16. This pertains to the principles of conduct that individuals and business manager use in guiding their behavior
and choices.
a) Business Ethics
b) Behavioral Ethics
c) Code of Ethics
d) Decision Ethics
17. These are the four areas of ethics in business, except:
a) Equity
b) Exercise of corporate power
c) Rights
d) Obligations
18. The purpose of a code of ethics is to ______ those acting on behalf of the organization on how they should
conduct themselves.
a) Affirm
b) Inform
c) Guide
d) Check
19. One of the levels of computer ethics where one should have real interest and acquire some skill and knowledge
in the field.
a) Pop Ethics
b) Para Ethics
c) Pare Ethics
d) Paria Ethics
20. A type of customer fraud.
a) Credit card fraud
b) Vendor Audits
c) Cash Fraud
d) Dos Attacks

0 0
1. Upon receipt of the supplier’s invoice, Accounts Payable reconciles all documents, posts to the purchases
journal, and records the _______ in the accounts payable subsidiary ledger.
a. asset
b. liability
c. equity
d. income

2. A clerk prepares a purchase requisition and sends copies to Purchasing and Accounts Payable.
a. True
b. False

3. To what departments do Purchasing department prepares and sends copies of purchase order for each
vendor?
a. Inventory control, Accounts Payable, Receiving (blind copy), and Purchasing Department
b. Purchasing Department, Receiving (blind copy), and Accounts Payable
c. Accounts Payable, Purchasing Department, the vendor and Inventory Control
d. Inventory Control, Accounts Payable, Receiving (blind copy), and the vendor.

4.The Accounts Payable department has now sent copies of the purchase requisition, purchase order, and
receiving report.
a. False
b. True

5. Periodically, the entries in the purchases journal are summarized in a _______ which is sent to the General
Ledger department.
a. Journal voucher
b. General ledger
c. Purchases journal
d. cash disbursements voucher

6. In a manual purchases system, the General Ledger department:


a. reconciles all documents, posts to the purchases journal, and records the liability in the accounts payable
subsidiary ledger
b. receive copies of the purchase requisition, purchase order, and receiving report.
c. reconciles the inventory amount with the account summary received from inventory control
d. all of the above

7. General Ledger also prepares a cash disbursements voucher and posts it in the voucher register.
a. True
b. False

8. The General Ledger department posts from the accounts payable journal voucher to the general ledger.
a. False
b. True

9. The Accounts Payable Department prepares the checks and returns paid vouchers to accounts payable, mails
the check to the supplier.
a. True
b. False

0 0
11. It is the organizational plan and all related measures to safeguard assets, ensure the accuracy and reliability
accounting records, promote operational efficiency, and encourage adherence to prescribed managerial policies.
IPO model
Accounting model
COSO model
Internal control

12. the systematic process of obtaining and evaluating evidence regarding assertion about economic actions and eve
in order to determine how well they correspond with established criteria.
Validity
Auditing
Reliability
Honesty

13. Is a widely used approach in systems analysis and software engineering for describing the structure of
information processing program or another process.
IPO model
Accounting model
COSO model 0 0
Internal control
14. Compliance Audit determines whether entities are complying with applicable laws, regulations, policies, a
procedures. T

15. Financial Audit examines the reliability and integrity of financial transactions, accounting records, and financ
statements. T

16. Instances that may be outside the control of processors are the following, except;
Information theft
Computer fraud
Information abuse
None of these

17. Objectives of Audit in Computerized Information includes the following, except;


Integrity
Reliabilty

0 0

You might also like