Your browser does not support JavaScript!

Accounting Information System

Showing 1-75 of 143 answers

A BPMN process flow can start in one pool and end in the collaborating pool.
  • FALSE Correct
A Class is a separately identifiable collection of business relationships.
  • FALSE Correct
A company would like to implement a management information system that integrates all functional areas within an organization to allow information exchange and collaboration among all parties involved in business operations. Which of the following systems is most effective for this application?
  • An enterprise resource planning system. Correct
A company's audit committee is responsible for fraud risk assessments.
  • FALSE Correct
A labor plan class would establish standard overhead allocation rates.
  • TRUE Correct
A pool in a BPMN model does not actually have to display any activities.
  • TRUE Correct
A supply chain system does not include information about.
  • Prospective customers Correct
A supply chain:
  • Refers to the flow of materials, information, payments and services. Correct
A systems analyst analyzes a business problem that might be addressed by an information system and recommends software or systems to address that problem.
  • TRUE Correct
A value chain is defined as the flow of materials, information, payments, and services from customer to supplier.
  • FALSE Correct
Access offers modules, which are defined by users to automate processes like opening a specific form.
  • FALSE Correct
According to COSO, which of the following components of the enterprise risk management addresses an entity's integrity and ethical values?
  • Internal environment. Correct
According to the Sarbanes-Oxley Act of 2002, it is the responsibility of the Board of Directors to establish and maintain the effectiveness of internal control.
  • FALSE Correct
Accounting and Finance is a primary activity in the value chain.
  • FALSE Correct
Accounting information systems are:
  • Records, processes and reports Correct
Accounting Information Systems at this date are all computerized.
  • FALSE Correct
An accounting information system (AIS) is defined as being an information system that records, processes and reports on transactions to provide financial information for decision making and control.
  • TRUE Correct
An enterprise resource planning system has which of the following advantages over multiple independent functional systems?
  • Increased responsiveness and flexibility while aiding in the decision-making process. Correct
An enterprise system is a centralized database that collects data from throughout the firm. This includes data from orders, customers, sales, inventory and employees.
  • TRUE Correct
An entity doing business on the internet most likely could use any of the following methods to prevent unauthorized intruders from accessing proprietary information except:
  • Batch processing. Correct
An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?
  • Disaster recovery plan. Correct
An intermediate error event can be used to model process exceptions.
  • TRUE Correct
Application controls limit who can change records in a system.
  • FALSE Correct
Asymmetric-key encryption is suitable for encrypting large data sets or messages.
  • FALSE Correct
Bacchus, Inc. is a large multinational corporation with various business units around the world. After a fire destroyed the corporation headquarters and largest manufacturing site, plans for which of the following would help Bacchus ensure a timely recovery?
  • Business continuity. Correct
Business models provide value in all of the following areas except which one?
  • Employee performance appraisal Correct
Business rules describe appropriate actions to take based on process conditions.
  • TRUE Correct
Certificate Authority (CA) issues digital certificates to bond the subscriber with a public key and a private key.
  • TRUE Correct
Classes could be grouped into Resources (R), Entity (E), and Assets (A) in data modeling.
  • FALSE Correct
Cloud computing is an internet-based computing where shared resources, software, and information is provided to firms on demand.
  • TRUE Correct
COBIT (Control Objectives for Information and related Technology) is a generally accepted framework for IT governance in the U.S.
  • TRUE Correct
Computer-assisted audit techniques (CAAT) are often used when auditing a company's IT infrastructure.
  • FALSE Correct
Consider the following BPMN diagram of a subprocess. Which of the following is required to correct an error in the diagram?
  • Add a sequence flow to an end event after the discard errors activity. Correct
Conversion labor costs become part of cost of goods sold.
  • TRUE Correct
Data governance is the convergence of data quality, data management, data policies, business process management, and risk management surrounding the handling of data in a company.
  • TRUE Correct
Data is defined as being information organized in a meaningful way to be useful to the user.
  • TRUE Correct
Data mining is the process of searching for patterns in the data in a data warehouse and to analyze the patterns for decision making.
  • TRUE Correct
Disaster recovery planning and business continuity management are preventive controls.
  • FALSE Correct
Documentation can be thought of as a tool for information transmission and communication.
  • TRUE Correct
Documentation helps with training but won't help with regulatory compliance issues.
  • FALSE Correct
Each Purchase Order would be ultimately linked to one cash disbursement.
  • FALSE Correct
Encryption is a preventive control ensuring data confidentiality and privacy during transmission and for storage.
  • TRUE Correct
Firewalls are security systems comprised of hardware and software that is built using routers, servers, and a variety of software.
  • TRUE Correct
Fraud triangle includes incentive, opportunity and an attitude to rationalize the fraud.
  • TRUE Correct
In a basic UML diagram of the conversion process, which of the following best describes the purpose of a duality association?
  • Links work in process events to the original production authorization. Correct
In a BPMN collaboration model of the purchase process, one pool describes the focal organization's activities and the other pool describes what?
  • The supplier's activities Correct
In a BPMN collaboration model of the purchase process, which of the following is the appropriate term for the message flows between pools?
  • Choreography Correct
In a collaboration model using BPMN, the interaction between participants is called orchestration.
  • FALSE Correct
In a computerized environment, internal controls can be categorized as general controls and application controls.
  • TRUE Correct
In a hierarchical data model, data elements are related in many-to-many relationships.
  • FALSE Correct
In a large multinational organization, which of the following job responsibilities should be assigned to be network administrator?
  • Managing remote access. Correct
In a large pubic corporation, evaluating internal control procedures should be responsibility of:
  • Internal audit staff who report to the board of directors. Correct
In Access, users can edit database information in reports.
  • FALSE Correct
In Microsoft Access, we use tables in a database for:
  • Data storage Correct
In Unified Modeling Language (UML) Class diagrams, Associations are represented by dashed lines.
  • FALSE Correct
In Unified Modeling Language (UML) the options for maximum multiplicity values are 1 and *.
  • TRUE Correct
In Unified Modeling Language (UML) the options for minimum multiplicity values are 0, 1, and 2.
  • FALSE Correct
In Unified Modeling Language (UML) the options for minimum multiplicity values are 1 and *.
  • FALSE Correct
Integrated test facility (ITF) is an automated technique that enables test data to be continually evaluated during the normal operation of a system.
  • TRUE Correct
Integrity of information means the information is:
  • A and B are correct. Correct
Internal controls guarantee the accuracy and reliability of accounting records.
  • FALSE Correct
Key distribution and key management are problematic under the symmetric-key encryption.
  • TRUE Correct
One type of fault tolerance is using redundant units to provide a system the ability to continue functioning when part of the system fails.
  • TRUE Correct
Outbound logistics are the activities associated with receiving and storing raw materials and other partially completed materials, and distributing those materials to manufacturing when and where they are needed.
  • FALSE Correct
Processing controls are IT general controls.
  • FALSE Correct
Queries in Access are utilized by users to enter data into tables and view existing records.
  • FALSE Correct
Refer to the following diagram. Which of the following answers provides the best interpretation of the multiplicities for the association between the Order class and the Products class?
  • An order may include many products. Correct
Review of the audit log is an example of which of the following types of security control?
  • Detective. Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Employees and Production Authorization classes?
  • One employee can authorize production multiple times. Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Products and Production Authorization classes?
  • Each production authorization is related to one product. Correct
Review the following diagram. Which answer provides the best interpretation of the multiplicities for the association between the Quote class and the Order class?
  • Each quote may result in many future Orders. Correct
Segregation of duties reduces the risk of errors and irregularities in accounting records.
  • TRUE Correct
Service Activities as defined in the value chain are those activities that provide the support of customers after the products and services are sold to them (e.g. warranty repairs, parts, instruction manuals, etc.).
  • TRUE Correct
Symmetric-key encryption method is used to authenticate users.
  • FALSE Correct
The "Where" SQL clause can be used to link two tables.
  • TRUE Correct
All courses