Filters
Question type

Study Flashcards

Accountants have several possible roles related to accounting information systems.Which of the following is not normally one of those roles?


A) Auditor of an AIS
B) User of the AIS
C) Programmer of the AIS
D) Design of the AIS

Correct Answer

verifed

verified

When a point of sale system is used and a customer checks out through a cash register, which of the following processes occurs?


A) Net income is computed.
B) Inventory values are updated.
C) Accounts payable balances are updated.
D) Replacement inventory is purchased.

Correct Answer

verifed

verified

The process of searching for identifiable patterns in data is called:


A) Sequential processing
B) Data warehousing
C) Data mining
D) Real-time processing

Correct Answer

verifed

verified

Using IT systems to enhance efficiency and effectiveness of internal or supply chain processes is called:


A) Information Technology Enablement
B) Information Systems Control
C) Information Technology Process Engineering
D) Information Technology Business Processes

Correct Answer

verifed

verified

Which of the following is NOT an objective of IT usage to support business processes?


A) Increased efficiency of business processes
B) Increased data to use in the data analytics process
C) Reduced cost of business processes
D) Increased accuracy of the data related to business processes

Correct Answer

verifed

verified

A system of computer hardware and software in which the software matches an invoice to its related purchase order and receiving report is called:


A) Point of sale system
B) Electronic data interchange
C) Automated matching
D) Evaluated receipt settlement

Correct Answer

verifed

verified

In order to have an automated matching system it is necessary to have access to paper copies of purchase orders and invoices.

Correct Answer

verifed

verified

The global computer network, or "information super highway", is the:


A) WAN
B) Intranet
C) Internet
D) LAN

Correct Answer

verifed

verified

C

Which of the following is not true of unethical behavior?


A) The only category of unethical behavior for accountants is inflating revenue.
B) Accountants are often pressured to help commit or cover up unethical behavior.
C) Hacking is an unethical behavior that accountants should be concerned about.
D) An accounting information system can be used to cover up unethical behavior.
TEST BANK - CHAPTER 1 - MULTIPLE CHOICE

Correct Answer

verifed

verified

Batch processing is best suited to applications that have large volumes of similar transactions that can be processed as regular intervals.

Correct Answer

verifed

verified

Each time a new transaction is completed, parts of the data warehouse must be updated.

Correct Answer

verifed

verified

The data in the data warehouse are said to be enterprise-wide because:


A) The data relate to all areas of the business.
B) The data are pulled from each of the operational databases and maintained in the data warehouse for many fiscal periods.
C) All areas of the business are able to access the data warehouse.
D) All transactions across the all areas of the business are recorded in the data warehouse.

Correct Answer

verifed

verified

Data in the data warehouse are called nonvolatile because they do not change rapidly in the same way that operational data change.

Correct Answer

verifed

verified

True

The use of BPR Business Process Reengineering) is a two-fold: 1) Aligns business processes with the IT systems used to recorded processes and, 2) :


A) Improves the efficiency and effectiveness of these processes.
B) Reduces the cost of these processes.
C) Enhances the usefulness of these processes.
D) Increases the accuracy of the process.

Correct Answer

verifed

verified

The proper management, control, and use of IT systems are known as:


A) IT Governance
B) IT Controls
C) IT Risk Management
D) IT Code of Ethics

Correct Answer

verifed

verified

This type of computer network is one that spans a relatively small area - often confined to a single building or group of buildings, and are intended to connect computers within an organization.


A) Local Area Network
B) Land Arena Network
C) Extranet
D) Internet

Correct Answer

verifed

verified

The "intercompany" component of electronic data interchange means that two or more companies are conducting business electronically.

Correct Answer

verifed

verified

IT Controls can be divided into two categories, general controls and application controls.Which of the following is an example of a general control?


A) The alignment of a company's IT strategy with its business strategy
B) The use of passwords to allow only authorized users to log into an IT-based accounting system
C) The use of an elaborate set of checks and balances whereby a company's leadership is held accountable for building shareholder value
D) A company performing background checks on employees of its IT department

Correct Answer

verifed

verified

B

A process, effected by an entity's board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives is referred to as:


A) Enterprise resource planning
B) Enterprise risk management
C) IT system control structure
D) Corporate governance structure

Correct Answer

verifed

verified

Which of the following is not true of the supply chain?


A) The supply chain includes vendors.
B) The supply chain excludes customers.
C) The supply chain includes information flows.
D) The supply chain includes secondary suppliers.

Correct Answer

verifed

verified

Showing 1 - 20 of 113

Related Exams

Show Answer