Test 1 Flashcards

1
Q

The value of information can best be determined by
A. its usefulness to decision makers
B. its relevance to decision makers
C. the benefits associated with obtaining the information minus the cost of producing it.
D. the extent to which it optimizes the value chain

A

C. the benefits associated with obtaining the information minus the cost of producing it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A frantic Barney Rubble lost a large sale because he could not access the sytem to verify the inventory was in stock and ready to be shipped. Which of the following characteristics of useful information is absent in the situation described above?
A. relevant
B. reliable 
C. complete
D. timely
E. understandable
F. verifiable
G accessible
A

G. accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the revenue be
A. give cash, get goods
B. give goods, get cash
C. Give cash, get labor
D. Give cash, get cash
A

B. give goods, get cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The primary objective of accounting is to
A. implement strong internal control
B. provide useful information to decision makers
C. prepare financial statements
D. ensure the profitability of an organization

A

B. provide useful information to decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An AIS provides value by
A. improving products or services through information that increases quality and reduces costs
B. providing timely and reliable information to decision makers
C. creating new products
D. Both A and B

A

D. both A and B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
the value chain concept is composed of two types of activities known as
A. primary and support
B. primary and secondary
C. support and value
D. technology and support
A

A. primary and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Source data automation refers to
A. using devices to capture transaction data in machine-readable form at the time the transaction is initiated
B. using the internet as the operating platform of an accounting information system
C. using an accounting information system to electronically bill customers
D. using an accounting information system to automate a previously manual transaction

A

A. using devices to capture transaction data in machine-readable form at the time the transaction is initiated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
The data processing method used by FedEx to track packages is an example of 
A. Real-time processing
B. batch processing
C. online batch processing
D. real-time batch processing
A

A. real-time processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pre-numbering of source documents helps to verify that
A. documents have been used in order
B. company policies were followed
C. all transactions have been recorded
D. source data automation was used to capture data

A

C. all transactions have been recorded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
documents that are sent to customers or suppliers and then sent back tot he company in the course of a business transaction are known as
A. turnaround documents
B. source documents
C. input documents
D. transaction documents
A

A. turnaround documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Issuing a purchase order is part of which transaction cycle
A. the revenue cycle
B. the expenditure cycle
C. the human resources cycle
D. the production cycle
A

B. the expenditure cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data must be collected about three facets of each business activity. What are they?
A. the business activity, the resources it affects, the people who participate
B. the business activity, the transactions it creates, the impact on the financial statements
C. the inputs, outputs and processes used
D. who is involved, what was sold, and how much was pad

A

A. the business activity, the resources it affects, the people who participate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is a true statement regarding a document flowchart?
A. a document flowchart illustrates the sequence of logical operations performed by a computer
B. A document flowchart is particularly useful in analyzing the adequacy of internal control procedures
C. a document flowchart is more useful than data flow diagram
D. a document flowchart is not normally used in evaluating internal control procedures

A

B. A document flowchart is particularly useful in analyzing the adequacy of internal control procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data flow diagrams depict
A. processes, but not who is performing the processes
B. processed, but not the data that flows between processes.
C. who is performing processes, but not how they perform the process
D. who is performing processes but no the data that flows between processes

A

A. processes, but not who is performing the processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
In the data flow diagram presented in the previous problem, inventory is a 
A. data store
B. data source
C. data flow
D. data source and destination
A

A. data store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The logical view of a database system refers to
A. how a user or programmer conceptually organizes and understands the data
B. how the DBMS accesses data fora . certain application program
C. how and where the data are physically arranged an stored
D. how master files store data values used by more than one application program.

A

A. how a user or programmer conceptually organizes and understands the data

17
Q
When the human resources manager wants to gather data about salary and start date by employees and by departments, the manager would use which language?
A. data manipulation language
B. data query language
C. data report language
D. data definition language
A

B. data query language

18
Q

how do users retrieve data stored in a database?
A. by viewing the appropriate data tables
B. by executing a query
C. by performing a search
D. by specifying the primary keys

A

B. by executing a query

19
Q

in a well structured relational database
A. foreign keys cannot be null
B. there must be at least two foreign keys
C. every column in a row must be single valued
D. one table must be related to all other tables.

A

C. every column in a row must be single valued

20
Q

identify the aspect of a well structured database that is incorrect.
A. data is consistent
B. redundancy is minimized and controlled
C. all data is stored in one table or relation
D. the primary key of any row in a relation cannot be null.

A

C. all data is stored in one table or relation

21
Q

identify the statement below that is false with regards to basic requirements of a relational database model.
A. primary keys can be null.
B. Foreign keys if not null, must have values that correspond to the value of a primary key in another table
C. all non key attributes in a table should describe a characteristic about the object identified by the primary key
D. every column in a row must be single-calued

A

A. primary keys can be null.

22
Q
"cooking the books" is typically accomplished by all of the following except
A. overstating inventory
B. accelerating recognition of revenue
C. inflating accounts payable
D. delaying recording of expenses
A

C. inflating accounts payable

23
Q
intentional or reckless conduct that results in materially misleading financial statements is called 
A. financial fraud
B. misstatement fraud
C. fraudulent financial reporting
D. audit failure fraud
A

C. fraudulent financial reporting

24
Q

lapping is best described as the process of
A. applying cash receipts to a different customers account in an attempt to conceal previous thefts of cash receipts.
B. inflating bank balances by transferring money among different bank accounts
C. stealing small amounts of cash, many times over a period of time
D. increasing expenses to conceal that an asset was stolen

A

A. applying cash receipts to a different customers account in an attempt to conceal previous thefts of cash receipts.

25
Q

Which of the following is not an example of the fraud triangle characteristic concerned with rationalization
A. revenge against the company
B. intent to repay “borrowed” funds in the future
C. sense of entitlement as compensation for receiving a lower than average raise
D. belief that the company won’t suffer because an insurance company will reimburse losses

A

A. revenge against the company

26
Q
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization
A. pressure
B. opportunity
C. rationalization
D. concealment
A

B. opportunity

27
Q
the simplest and most common way to commit a computer fraud is to 
A. alter computer input
B. alter computer output
C. modify the processing
D. corrupt the database
A

A. alter computer input

28
Q

sequence codes

A

items are numbered consecutively to account for them so that gaps in the sequence code indicate missing items that should be investigated. Examples of sequence code use are prenumbered checks, invoices, and purchase order

29
Q

block codes

A

blocks of numbers that are reserved for specific categories of data, thereby helping to organize the data. an example is a chart of accounts

30
Q

group codes

A

two or more subgroups of digits that are used to code an item. often used in conjunction with block code

31
Q

mnemonic codes

A

letters and numbers that are interspersed to identify an item. derived from the description of the item and is usually easy to memorize