Professional Documents
Culture Documents
Ae20-Preliminary Exam Questionnaire
Ae20-Preliminary Exam Questionnaire
Ae20-Preliminary Exam Questionnaire
Balagtas, Bulacan
ACCOUNTING INFORMATION SYSTEM
PRELIMINARY EXAMINATION
A. a business activity
B. automatic batch processing
C. an accounting department source document
D. a trial balance query
2. Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis
area. Antia uses computer technology to provide superior customer service. The
store's database system was designed to make detailed information about each
Japanese fan easily accessible to her customers. Accordingly, the fan price and
condition are provided for each fan, along with many pictures of each fan. In
Antia's database, the Japanese fans (as a whole) represent a(n)
A. entity.
B. attribute.
C. field.
D. record.
3. Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis
area. Antia uses computer technology to provide superior customer service. The
store's database system was designed to make detailed information about
each Japanese fan easily accessible to her customers. Accordingly, the fan
price and condition are provided for each fan, along with many pictures of
each fan. In Antia's database, the data about each Japanese fan represents
a(n)
A. entity.
B. attribute.
C. field.
D. record.
4. Identify the statement below that is false with regards to effective coding
practices.
[AUTHOR NAME] 1
5. When the sum of all entries in the subsidiary ledger equals the balance in the
corresponding general ledger account, it is assumed that
A. system users
B. system designers
C. system auditors
D. system converters
A. Cost accountants
B. Creditors
C. Stockholders
D. Tax authorities
10. Which of the following is not usually a consideration when designing a coding
system?
11. Identify the statement below that is not true with regards to the accounts
receivable subsidiary ledger.
[AUTHOR NAME] 2
12. A purchase requisition is a common source document used to facilitate which
business activity?
A. customer sale
B. receipt of goods
C. inventory purchase
D. purchase request
A. external auditors
B. internal accountants
C. internal auditors
D. third-party accountants
A. a gambling addiction
B. lack of segregation of duties
C. centralized decision making environment
D. questionable integrity of employees
[AUTHOR NAME] 3
20. The AIS must include controls to ensure
A. afety and availability of data.
B. marketing initiatives match corporate goals.
C. information produced from data is accurate.
D. both safety and availability of data and information produced from data
is accurate
21. The transaction cycle approach yields efficiency when processing of a large
number of transactions because
A. a large number of transactions within a given cycle can be categorized
into a relatively small number of distinct types.
B. transaction cycles are easier to computerize.
C. the transaction cycle approach represents the natural order of business.
D. transaction cycles are easy to understand.
23. In which transaction cycle would information for inventory purchases be most
likely to pass between internal and external accounting information systems?
24. Which step below is not considered to be part of the data processing cycle?
A. data input
B. feedback from external sources
C. data storage
D. data processing
A. revenue cycle.
B. expenditure cycle.
C. financing cycle.
D. production cycle.
27. An accounting information system (AIS) processes ________ to provide users with
________.
A. data; information
B. data; transactions
C. information; data
[AUTHOR NAME] 4
D. data; benefits
A. Check fraud.
B. Customer fraud.
C. Credit card fraud.
D. Refund fraud.
A. Human error.
B. Cost versus benefit.
C. Collusion.
D. Authorization.
A. Audit trail.
B. Internal control.
C. Risk assessment.
D. Supporting documentation.
31. This type of control is designed to avoid errors, fraud, or events not authorized by
management.
A. Prevention
B. Judicial
C. Detection
D. Correction
32. The authors presented their “picture” of internal control as a series of umbrellas
which represent different types of controls. Which of the following is not one of
those types of controls?
A. Prevention
B. Investigation
C. Detection
D. Correction
A. DoS Attack.
B. Hacking.
C. Spoofing.
D. Phishing.
34. Which of the following is not one of the three critical actions that a company
can undertake to assist with fraud prevention and fraud detection?
[AUTHOR NAME] 5
D. Maintain a system of information technology controls.
35. Magna Naccaw, a sales employee, stole merchandise from her employer and
Cassab Watt, the accounting clerk, covered it up by altering the inventory
records. This is an example of
A. Inventory theft.
B. Financial journal fraud.
C. Skimming.
D. Collusion.
A. Overstating expenses.
B. Understating assets.
C. Overstating revenues.
D. Overstating liabilities.
A. Defalcation.
B. Internal Theft.
C. Misappropriation of Assets.
D. Earnings Management.
38. Which ethical principle states that the benefit from a decision must outweigh the
risks, and that there is no alternative decision that provides the same or greater
benefit with less risk?
A. minimize risk
B. justice
C. informed consent
D. proportionality
40. For an action to be called fraudulent, all of the following conditions are required
except
A. poor judgment
B. false representation
C. intent to deceive
D. injury or loss
[AUTHOR NAME] 6
B. its relevance to decision makers.
C. the benefits associated with obtaining the information minus the cost of
producing it.
D. the extent to which it optimizes the value chain.
43. Identify the piece of information below that is typically needed to acquire a
building.
A. job descriptions
B. vendor performance
C. market coverage
D. capacity needs
44. Many modern accounting software packages offer separate transaction cycle
modules. What is the reason for this?
45. Which of the following is not one of the three basic types of data about a
specific sales transaction that should be captured by an Accounting Information
System?
47. Which of the following statements below shows the contrast between data and
information?
A. Data is the output of an AIS.
B. Information is the primary output of an AIS.
C. Data is more useful in decision making than information.
D. Data and information are the same
[AUTHOR NAME] 7
D. All of these
50. Identify the primary reason that it is important for a firm to identify the AIS
improvements likely to yield the greatest return.
51. Which of the following is not an example of how an AIS adds value to an
organization?
A. All employees at a hospital can access and update patient records from
any computer terminal in the hospital.
B. A customer service representative can find a customer's account data,
purchase history, payment history, and salesperson's name while on the
phone with the customer, to resolve issues quickly.
C. Suppliers are able to access sales data directly from the point-of-sale
system of a retailer and deliver inventory automatically when needed.
D. Client tax files are encrypted and made available on the CPA firm's
network to any employee with an access code.
57. Information that is free from error or bias and accurately represents the events or
activities of the organization is
A. relevant.
B. reliable.
C. verifiable.
D. Timely
60. The ongoing review and evaluation of a system of internal control is referred to a
A. Risk assessment.
B. Monitoring.
[AUTHOR NAME] 8
C. Segregating.
D. Communication
61. Factors that limit the effectiveness of internal controls include all of the following
except
62. If an accounting supervisor were allowed to hire employees, approve the hours
worked, prepare the paychecks, and deliver the paychecks, which of the
categories of control activities would be violated?
A. Adequate records
B. Segregation of duties
C. Authorization of transactions
D. Independent checks
64. Which control activity is intended to serve as a method to confirm the accuracy
or completeness of data in the accounting system?
A. Authorization
B. Segregation of duties
C. Security of assets
D. Independent checks and reconciliations
65. COSO describes five components of internal control. Which of the following
terms is best described as “policies and procedures that help ensure
management directives are carried out and management objectives are
achieved”?
A. Risk assessment
B. Information and communication
C. Control activities
D. Control environment
66. A company’s cash custody function should be separated from the related cash
recordkeeping function in order to:
[AUTHOR NAME] 9
68. The review of amounts charged to the company from a seller that is purchased
from is called a:
A. Vendor audit.
B. Seller review.
C. Collusion.
D. Customer review.
69. The most difficult type of misstatement to discover is fraud that is concealed by:
A. Over-recording the transactions.
B. Nonrecorded transactions.
C. Recording the transactions in subsidiary records.
D. Related parties.
A. Inventory theft
B. Expense account fraud
C. Payroll fraud
D. Refund fraud
71. There are many possible indirect benefits to management when management
fraud occurs. Which of the following in not an indirect benefit of management
fraud?
A. Rationalization
B. Incentive
C. Conversion
D. Opportunity
73. Documents that are sent to customers or suppliers and then sent back to the
company in the course of a business transaction are known as
A. turnaround documents.
B. source documents.
C. input documents.
D. transaction documents.
A. a utility bill
B. POS (point-of-sale) scanners in retail stores
C. a bill of lading
D. a subsidiary ledger
[AUTHOR NAME] 10
76. Sasha Blouse has been the controller of Downtown Tires for 25 years. Ownership
of the firm recently changed hands and the new owners are conducting an
audit of the financial records. The audit has been unable to reproduce financial
reports that were prepared by Ms. Blouse. While there is no evidence of
wrongdoing, the auditors are concerned that the discrepancies might
contribute to poor decisions. Which of the following characteristics of useful
information is absent in the situation described above?
A. Relevant
B. Reliable
C. Complete
D. Verifiable
77. Who of the following would not be involved in the revenue cycle?
79. The chance for fraud or ethical lapses will not be reduced if management:
81. Fraudsters typically try to justify their behavior by telling themselves that they
intend to repay the amount stolen or that they believe the organization owes
them the amount stolen. This justification is referred to as:
A. Opportunity.
B. Rationalization.
C. Incentive.
D. Concealment.
82. Changing the accounting records to hide the existence of a fraud is termed:
A. Theft.
B. Conversion.
C. Collusion.
[AUTHOR NAME] 11
D. Concealment.
83. A set of documented guidelines for moral and ethical behavior within an
organization is termed a(n):
84. If an organization’s IT systems are not properly controlled, they may become
exposed to the risks of:
A. Unauthorized access.
B. Erroneous processing.
C. Service interruption.
D. All of the above.
A. Management override.
B. Management collusion.
C. Management stewardship.
D. Management manipulations.
A. operations management
B. middle management
C. top management
D. line management
A. top management
B. middle management
C. operations management
D. executive management
[AUTHOR NAME] 12
D. management reporting system
91. The major difference between the financial reporting system (FRS) and the
management reporting system (MRS) is the
A. FRS provides information to internal and external users; the MRS provides
information to internal users
B. FRS provides discretionary information; the MRS provides nondiscretionary
information
C. FRS reports are prepared using information provided by the general
ledger system; the MRS provides information to the general ledger system
D. FRS reports are prepared in flexible, nonstandard formats; the MRS reports
are prepared in standardized, formal formats
92. The purpose of the transaction processing system includes all of the following
except
A. a financial transaction
B. an accounting record
C. an accounting report
D. a nonfinancial transaction
94. When designing the data collection activity, which type of data should be
avoided?
A. data that is relevant
B. data that is efficient
C. data that is redundant
D. data that is accurate
95. The most basic element of useful data in the database is the
A. record
B. key
C. file
D. attribute
A. key
B. file
C. record
D. character
A. summarization
B. storage
C. retrieval
D. deletion
[AUTHOR NAME] 13
98. Which activity is not part of the finance function?
A. cash receipts
B. portfolio management
C. credit
D. general ledger
A. data integrity
B. separation of duties, such as record keeping and custody of physical
resources
C. generation of accurate and timely information
D. business segmentation by function
[AUTHOR NAME] 14