Chapter 4 MCQ Flashcards
All of the following are reasons why information technology is important to accountants except:
a) IT supports AIS functions such as communications and record keeping
b) Accountants must often evaluate AISs for themselves or for clients
c) It is important to keep up; if your competitor buys new computers, you shouldtoo
d) IT is likely to affect the way accountants work in the future
C
The AICPA regularly conducts a voluntary survey to identify a list of important IT trends or factors called:
a) The Top Ten Technologies
b) The Top Twenty Technologies
c) IT Trends for Tomorrow
d) The AICPA IT List
A
The hardware of a computer system includes the computer itself and other devices that help the computer perform its tasks. These “other devices” are commonly also called:
a) Helper equipment
b) IT devices
c) Peripheral equipment
d) Secondary equipment
e) Accessory equipment
C
All of the following are examples of peripheral equipment except:
a) Input equipment
b) Output equipment
c) Communications equipment
d) Primary memory equipment
e) Secondary storage equipment
D
Which of these is one of the five interacting components of an AIS?
a) Fuzzy logic
b) Testing
c) Certification
d) Procedures
e) Internet
D
Time cards, airline reservation screens, and bank deposit screens best describe which of the following?
a) Data transcription
b) Point-of-sale devices
c) Source documents
d) Turnaround documents
e) Data transaction documents
C
MICR is most closely associated with:
a) The airline industry
b) The data communications industry
c) Manufacturing
d) The banking industry
D
The UPC code is an example of a(n):
a) PDA
b) MICR
c) Bar code
d) Biometric input
C
Which of the following best describes documents initially prepared by a company, then sent to individuals, and returned to an organization for data processing?
a) Mark-sense media
b) Source documents
c) Turnaround documents
d) MICR documents
C
A POS device is usually attached to a:
a) Printer
b) Bank check
c) Cash register
d) Keyboard
e) Computer mouse
C
POS devices, bar code readers, and OCR devices are examples of:
a) Input devices
b) Output devices
c) Processing devices
d) Transaction devices
A
Minicomputers, mainframe computers, supercomputers, and laptops are examples of:
a) Input devices
b) Output devices
c) Central processing units
d) Display devices
C
Printers and video monitors are examples of:
a) Output devices
b) Input devices
c) Processing devices
d) Storage devices
A
Which of computers is the most portable?
a) Minicomputer
b) Laptop computer
c) Mainframe computer
d) Supercomputer
B
Which of these secondary storage media is likely to cost the least?
a) Hard disk
b) Blue-ray disc
c) CD-ROM
d) Flash drive
D
Which of these secondary storage media is likely to hold the most data?
a) Hard disk
b) Blue-ray disc
c) CD-ROM
d) Flash drive
A
Which of these is not a secondary storage medium?
a) Hard disk
b) Flash drive
c) Random access memory (RAM)
d) CD-ROM
C
Which of these is not an acronym associated with secondary storage?
a) RAM
b) WORM
c) CD-ROM
d) DVD
A
A 5-inch plastic disk used to store information up to 17 gigabytes describes which of the following?
a) CD-ROM
b) Flash memory
c) Zip disk
d)DVD disk
D
A bar code reader is most likely to be used by which type of system?
a) POS system
b) MICR system
c) Printer/scanner system
d) Fax machine system
A
Which type of company is most likely to use MICR?
a) Grocery store
b) Bank
c) Phone company
d) Web site seller
B
The term “mark sense media” is most-closely related to which of the following?
a) POS system
b) OCR system
c) MICR system
d) ABA system
B
Which of the following is the most important reason to use POS systems, OCR systems, or MICR systems?
a) To use the latest information technology
b) To avoid data transcription
c) To create an extra layer of IT infrastructure
d) To decrease dependency on foreign oil
A
Which of these is not a basis for authenticating a person and validating his or her identity?
a) Something they have (such as a key)
b) Something they know (such as a password)
c) Something they are (such a fingerprint)
d) Something they can do (such as a walking gait)
e) all of these are methods for authenticating users
E