ACC 564 Quiz 1, 2, 3, 4 Questions and Answers

profileGuide4Students
 (Not rated)
 (Not rated)
Chat

ACC 564 Accounting Information Systems – Strayer

 

ACC 564 Week 3 Quiz 1 (Chapter 1, 2, 3, 4, 5) 

1. An accounting information system must be able to perform which of the following tasks?

2. Which of the following is not an example of a common activity in an AIS?

3. Which of the following is not one of the components of an AIS?

4. One group that relies on both the adequate collection and transformation of data for decision-making purposes for an organization is

5. The primary objective of accounting is to

6. The American Institute of Certified Public Accountants (AICPA) has recognized the importance of AIS and the major impact information technology has on the area of accounting. To recognize individual CPAs who have met educational and experiential requirements in this area, the group formally created the designation known as

7. The AIS must include controls to ensure

8. A change in the AIS that makes information more easily accessible and widely available within an organization is most likely to first influence the

9. The process of creating value for customers is the result of nine activities that form a

10. The value chain concept is composed of two types of activities known as

11. Which of the following is a primary activity in the value chain?

12. In value chain analysis, what is the activity of arranging the delivery of products to customers called?

13. An AIS provides value by

14. In Chapter 1, Figure 1-4 shows the factors that influence the design of AIS. The diagram shows a bi-directional arrow between the organizational culture and the AIS. The reason for this two-way interchange between organizational culture and AIS is

15. An example of inbound logistics would consist of

16. A good example of how an AIS is used to share knowledge within an organization is

................................................(350 plus Practice Question & Answers)

 

ACC 564 Week 5 Quiz 2 (Chapter 6, 7, 8, 9)
1. Which of the following is not a method of identify theft?

2. Which method of fraud is physical in its nature rather than electronic?

3. Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises?

4. The deceptive method by which a perpetrator gains access to the system by pretending to be an authorized user is called

5. The unauthorized access to, and use of, computer systems is known as

6. A fraud technique that slices off tiny amounts from many projects is called the ________ technique.

7. Data diddling is

8. Spyware is

9. The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called

10. Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using

11. A fraud technique that allows a perpetrator to bypass normal system controls and enter a secured system is called

12. A set of unauthorized computer instructions in an otherwise properly functioning program is known as a

13. A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.

14. Wally Hewitt is an accountant with a large accounting firm. The firm has a very strict policy of requiring all users to change their passwords every sixty days. In early March, Wally received an email from the firm that explained that there had been an error updating his password and that provided a link to a Web site with instructions for re-entering his password. Something about the email made Wally suspicious, so he called the firm's information technology department and found that the email was fictitious. The email was an example of

15. Developers of computer systems often include a user name and password that is hidden in the system, just in case they need to get into the system and correct problems in the future. This is referred to as a

16. In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long distance phone calls. The people who use these methods are referred to as

17. During a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of

18. Chiller451 was chatting online with 3L3tCowboy. "I can't believe how lame some people are! :) I can get into any system by checking out the company web site to see how user names are defined and who is on the employee directory. Then, all it takes is brute force to find the password." Chiller451 is a ________ and the fraud he is describing is ________.

19. After graduating from college with a communications degree, Sylvia Placer experienced some difficulty in finding full-time employment. She free-lanced during the summer as a writer and then started a blog in the fall. Shortly thereafter she was contacted by Clickadoo Online Services, who offered to pay her to promote their clients by mentioning them in her blog and linking to their Web sites. She set up several more blogs for this purpose and is now generating a reasonable level of income. She is engaged in

20. Telefarm Industries is a telemarketing firm that operates in the Midwest. The turnover rate among employees is quite high. Recently, the information technology manager discovered that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's database and copy a list of customers from the past three years that included credit card information. Telefarm was a victim of

................................................(200 plus Practice Question & Answers)

 

ACC 564 Week 8 Quiz 3 (Chapter 10, 11, 12, 13)
1. The data entry control that would best prevent entering an invoice received from a vendor who is not on an authorized supplier list is

2. Forms design is an example of this type of control.

3. Sequentially prenumbered forms is an example of a(n)

4. Turnaround documents are an example of a(n)

5. A validity check is an example of a(n)

6. Parity checks are an example of a(n)

7. User reviews are an example of a(n)

8. Data matching is an example of a(n)

9. Batch totals are an example of a(n)

10. Cancellation and storage of documents means that

11. Check digit verification is an example of a(n)

12. This ensures that the input data will fit into the assigned field.

13. This tests a numerical amount to ensure that it does not exceed a predetermined value nor fall below another predetermined value.

14. This determines if all required data items have been entered.

15. This determines the correctness of the logical relationship between two data items.

16. This determines if characters are of the proper type.

17. This tests a numerical amount to ensure that it does not exceed a predetermined value.

18. This batch processing data entry control sums a field that contains dollar values.

19. This batch processing data entry control sums a non-financial numeric field.

20. When I enter a correct customer number, the data entry screen displays the customer name and address. This is an example of

................................................(300 plus Practice Questions & Answers)

 

ACC 564 Week 9 Quiz 4 (Chapter 14, 15, 16, 17)
1) The logical structure of a database is described by the

2) The schema that provides an organization-wide view of the entire database is known as the

3) A set of individual user views of the database is called the

4) A low-level view of the database that describes how the data are actually stored and accessed is the

5) Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema.

6) The ________ contains information about the structure of the database.

7) Which of the following would not be found in a data dictionary entry for a data item?

8) The data dictionary usually is maintained

9) Reports produced using the data dictionary could include all of the following except a list of

10) Which statement below concerning the database management system (DBMS) is false?

11) Which would not generally be considered a data dictionary output report?

12) Creating an empty table in a relational database requires use of the ________, and populating that table requires the use of ________.

13) When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language?

14) If a national sales tax were implemented, which language would be used to add a new field in the sales table to track the sales tax due?

15) The feature in many database systems that simplifies the creation of reports by allowing users to specify the data elements desired and the format of the output. is named the

16) The abstract representation of the contents of a database is called the

17) The problem of changes (or updates) to data values in a database being incorrectly recorded is known as

18) The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the

19) Inability to add new data to a database without violating the basic integrity of the database is referred to as the

20) A relational database in which customer data is not maintained independently of sales invoice data will most likely result in

................................................(200 plus Practice Questions and Answers)

    • 8 years ago
    ACC 564 Quiz 1, 2, 3, 4 Questions and Answers
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      acc_564_quiz_1_2_3_4.zip