Professional Documents
Culture Documents
Stuvia 1320287 Test Bank For Accounting Information Systems 15th Edition by Romney Steinbart Summers Wood
Stuvia 1320287 Test Bank For Accounting Information Systems 15th Edition by Romney Steinbart Summers Wood
written by
valentineclinton
www.stuvia.com
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1.1 Distinguish data from information, discuss the characteristics of useful information, and
explain how to determine the value of information.
1) Which of the following statements below shows the contrast between data and
information?
A) Data is the output of an AIS.
B) Information is the primary output of an AIS.
C) Data is more useful in decision making than information.
D) Data and information are the same.
Answer: B
Answer: B
Answer: C
Answer: A
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) Reliable
C) Relevant
D) Complete
Answer: C
6) Information that is free from error or bias and accurately represents the events or activities
of the organization is
A) relevant.
B) reliable / Faithful Representation.
C) verifiable.
D) timely.
Answer: B
7) Information that does not omit important aspects of the underlying events or activities
that it measures is
A) complete.
B) accessible.
C) relevant.
D) timely.
Answer: A
Answer: A
9) Data must be converted into information to be considered useful and meaningful for
decision making. There are six characteristics that make information both useful and
meaningful. If information is free from error or bias and accurately represents the events or
activities of the organization, it is representative of the characteristic of
A) relevancy.
B) timeliness.
C) understandability.
D) reliability.
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
10) Inventory information is provided in real time by a firm's accounting information system.
The accuracy of this information is questionable, however, since the production manager
often reports stock outs of components that the system indicates are in stock. Which of the
following characteristics of useful information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Answer: B
11) Cheryl Metrejean has been the controller of Downtown Tires for 25 years. Ownership of
the firm recently changed hands and the new owners are conducting an audit of the financial
records. The audit has been unable to reproduce financial reports that were prepared by Ms.
Metrejean. While there is no evidence of wrongdoing, the auditors are concerned that the
discrepancies might contribute to poor decisions. Which of the following characteristics of
useful information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Answer: F
12) In 2003, Singh Manufacturing implemented a Web-based information system that allows
all employees to access mission-critical information. The intention was to increase production
efficiency. Unfortunately, it had the opposite effect, as deliveries fell behind schedule and
costs increased. Shaman Gupta, the director of information technology services, asked Ashlee
Wells to come in and talk with him about the system. Ashlee is a long-time employee of
Singh, and her opinion is valued by her peers and by her supervisor.
"So Ashlee, how's it going down there in the shop?"
"Not so good, Shaman. Used to be we got a weekly pick list so we knew how to plan
production. Now, we got that computer system. Most of us can't figure out how to use it to do
our jobs. Is there some way to print out a pick list?"
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Shaman thought for a while before responding. "Well, Ashlee, to tell you the truth, I'm not so
sure how to do it myself, but there must be a way. We'll bring in the consultants that helped
us build the system. Maybe they can help."
Which of the following characteristics of useful information is absent in the situation
described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Answer: E
13) Wisconsin Dells, Wisconsin, is a popular tourist destination. During the winter months,
the population dwindles to a meager few, but when summer comes, the size of the town
surges. Hunter Jackson is the town sanitation engineer. When the size of the town surges, so
do his responsibilities. Among them is management of the sewage processing volume.
In an interview with the local paper, Hunter complained that a report on tourist population
that he uses to adjust processing volume refers to data that was collected four days ago and it
takes him a week to make adjustments. Which of the following characteristics of useful
information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Answer: D
14) A frantic Barney Rubble lost a large sale because he could not access the system to verify
the inventory was in stock and ready to be shipped. Which of the following characteristics of
useful information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
G) accessible
Answer: G
15) Message left on voicemail: "Hi Nikki! Just landed at the airport. How about dinner this
evening if you're available. Call me!" Which of the following characteristics of useful
information is absent in the situation described above?
A) relevant
B) reliable
C) complete
D) timely
E) understandable
F) verifiable
G) accessible
Answer: C
16) Chopra, Limited, is an Indian company operating in New York state. It offers stylized,
boutique public relations services to upscale retailers in quaint New England towns. A major
source of revenue is a weekly newsletter that reports on current and projected tourist travel
and spending patterns. Preparation of the newsletter requires study and analysis of weather
conditions, economic activity, and travel costs. It is available at an annual subscription rate of
$299.99. There are currently 190 subscribers. Preparation and distribution of the newsletter
costs $12,000 annually. The value of information to subscribers is
A) $236.83.
B) $44,998.10.
C) less than $63.16.
D) at least $300.00.
Answer: D
17) Baggins Incorporated identifies new product development and product improvement as
the top corporate goals. An employee developed an innovation that will correct a
shortcoming in one of the company's products. Although Baggins current Return on
Investment (ROI) is 15%, the product innovation is expected to generate ROI of only 12%. As a
result, the employee fails to follow up. As a result, awarding bonuses to employees based on
ROI resulted in
A) goal conflict.
B) information overload.
C) goal congruence.
D) decreased value of information.
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
18) Which of the following tradeoffs between characteristics of useful information is least
objectionable?
A) incomplete information received on a timely basis
B) irrelevant information received in an understandable format
C) unreliable information easily accessible
D) verifiable information received in unreadable format
Answer: A
19) Which of the following is not one of the three basic types of data about a specific sales
transaction that should be captured by an Accounting Information System?
A) name of the employee who completed the sale
B) daily sales quota
C) product sold
D) date
Answer: B
1.2 Explain the decisions an organization makes and the information needed to make them.
1) Paid time-off policies, job descriptions, and procedures manuals are examples of
information needed to support key decisions in what business process?
A) hire and train employees
B) acquire inventory
C) sell merchandise
D) collect payment from customers
Answer: A
2) Before a firm can identify the information needed to effectively manage a process, the firm
must
A) understand the process .
B) hire programmers.
C) purchase computers and/or workstations.
D) obtain internet access.
Answer: A
3) Identify the piece of information below that is typically needed to acquire a building.
A) job descriptions
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) vendor performance
C) market coverage
D) capacity needs
Answer: D
4) Identify the piece of information below that is typically needed to acquire inventory.
A) job descriptions
B) vendor performance
C) market coverage
D) capacity needs
Answer: B
5) Identify the piece of information below that is typically needed to hire and train
employees.
A) job descriptions
B) vendor performance
C) market coverage
D) capacity needs
Answer: A
Answer: B
7) What is a key decision that needs to be made with regards to selling merchandise?
A) which credit cards to accept
B) which employees to hire
C) which public accounting firm to employ
D) how much capital to acquire
Answer: A
8) What is a key decision that needs to be made with regards to acquiring inventory?
A) which credit cards to accept
B) which employees to hire
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
9) What is a key decision that needs to be made with regards to acquiring equipment?
A) the location
B) pro forma income statement
C) how much capital to acquire
D) job descriptions
Answer: A
1.3 Identify the information that passes between internal and external parties and an AIS.
1) One group that relies on both the adequate collection and transformation of data for
decision-making purposes for an organization is
A) management.
B) interested outsiders.
C) competitors.
D) the government.
Answer: A
2) Who of the following is not a stakeholder with whom an accounting information system
typically communicates directly?
A) Wall Street industry analyst
B) venture capitalist
C) company that supplies raw materials
D) company that purchases finished goods for resale to consumers
Answer: A
3) In which transaction cycle would customer sales transaction information be most likely to
pass between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Answer: A
4) In which transaction cycle would information for inventory purchases be most likely to pass
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
5) In which transaction cycle would information for paying employees be most likely to pass
between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Answer: C
6) In which transaction cycle would information for paying interest be most likely to pass
between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Answer: D
7) In which transaction cycle would information for borrowing money be most likely to pass
between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Answer: D
8) In which transaction cycle would information for hiring employees be most likely to pass
between internal and external accounting information systems?
A) the revenue cycle
B) the expenditure cycle
C) the human resources / payroll cycle
D) the financing cycle
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: D
10) Identify the party below that is not internal to the firm.
A) customer
B) management
C) employees
D) CEO
Answer: A
Answer: B
Answer: A
10
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: B
5) Groups of related business activities such as the acquisition of merchandise and payment
of vendors are called
A) transaction cycles.
B) economic cycles.
C) business events.
D) transactions.
Answer: A
6) The transaction cycle that includes the events of hiring employees and paying them is
known as the
A) revenue cycle.
B) expenditure cycle.
C) human resources cycle.
D) financing cycle.
Answer: C
7) The transaction cycle approach yields efficiencies when processing of a large number of
transactions because
A) a large number of transactions within a given cycle can be categorized into a relatively small
number of distinct types.
B) transaction cycles are easier to computerize.
C) the transaction cycle approach represents the natural order of business.
D) transaction cycles are easy to understand.
Answer: A
11
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) financing
D) revenue
Answer: A
Answer: A
1.5 Explain what an accounting information system (AIS) is and describe its basic functions.
1) An accounting information system must be able to perform which of the following tasks?
A) collect transaction data
B) process transaction data
C) provide adequate controls
D) all of the above
Answer: D
Answer: D
Answer: D
12
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
5) Many modern accounting software packages offer separate transaction cycle modules.
What is the reason for this?
A) Every organization does not need to implement all of the available transaction cycle modules.
B) Most businesses do not need the revenue cycle module as part of their AIS.
C) The nature of a given transaction cycle is the same irrespective of the type of organization.
D) A properly designed AIS does not use the concept of separate business transaction cycles to
process transactions.
Answer: A
1) The American Institute of Certified Public Accountants (AICPA) has recognized the
importance of AIS and the major impact information technology has on the area of
accounting. To recognize individual CPAs who have met educational and experiential
requirements in this area, the group formally created the designation known as
A) the Certified Information Auditor.
B) the Certified Internal Auditor.
C) the Certified Information Technology Professional.
D) the Certified Data Processing Professional.
Answer: C
Answer: D
13
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: A
5) When the AIS provides information in a timely and accurate manner, it stands as an
example of
A) improved decision making.
B) improving the quality and reducing the costs of products or services.
C) improving efficiency.
D) all of the above
Answer: D
Answer: D
7) A well-designed AIS can improve the decision making in an organization. Identify the
statement below that describes a situation where an AIS may actually inhibit effective
decision making.
A) An AIS provides to its users an abundance of information without any filtering or condensing
of such information.
B) An AIS identifies situations requiring management action.
C) An AIS reduces uncertainty, and therefore accounting information can provide a basis for
choosing among alternative courses of action.
D) An AIS provides information about the results of previous decisions which provides decision
makers with feedback that can be used in future decision making.
Answer: A
8) Which of the following is not an example of how an AIS adds value to an organization?
14
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) All employees at a hospital can access and update patient records from any computer
terminal in the hospital.
B) A customer service representative can find a customer's account data, purchase history,
payment history, and salesperson's name while on the phone with the customer, to resolve
issues quickly.
C) Suppliers are able to access sales data directly from the point-of-sale system of a retailer and
deliver inventory automatically when needed.
D) Client tax files are encrypted and made available on the CPA firm's network to any employee
with an access code.
Answer: A
1.7 Explain how an AIS and corporate strategy affect each other.
1) A change in the AIS that makes information more easily accessible and widely available
within an organization is most likely to first influence the
A) organizational culture.
B) customer base.
C) external financial statement users.
D) production activity.
Answer: A
2) In Chapter 1, Figure 1-4 shows the factors that influence the design of AIS. The diagram
shows a bi-directional arrow between the organizational culture and the AIS. The reason for
this two-way interchange between organizational culture and AIS is
A) that the AIS should not influence the values of the organizational culture.
B) because the organization's culture influences the AIS, and likewise the AIS influences the
organization's culture by controlling the flow of information within the organization.
C) due to the transfer of managers between the two corporate elements.
D) the AIS impacts the organization's key strategies.
Answer: B
Answer: A
15
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Identify the primary reason that it is important for a firm to identify the AIS improvements
likely to yield the greatest return.
A) because business strategy directly influences AIS, but not information technology
B) because most organizations have limited resources
C) because a firm never wants to waste time addressing issues that are not urgent
D) because it is expensive to improve accounting information systems
Answer: B
6) An AIS that makes information more easily accessible and more widely available is likely to
increase pressure for
A) centralization and defined procedures.
B) centralization and autonomy.
C) decentralization and defined procedures.
D) decentralization and autonomy.
Answer: D
Answer: A
Answer: C
1) The process of creating value for customers is the result of nine activities that form a
A) value chain.
B) capitalist operation.
C) profitable business.
D) information system.
16
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: A
Answer: D
Answer: C
Answer: B
6) One activity within the value chain is research and development. This activity can be
identified as a
A) firm infrastructure activity.
B) human resources activity.
C) technology activity.
D) purchasing activity.
17
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
7) Clemente Santiago has formed a business that sells carved gourmet coconuts. He has hired
five employees. The most senior is Friday, who manages the carving process. Monday is the
newest employee. She collects the coconuts. Tuesday takes calls from unhappy customers.
Wednesday tosses finished coconuts into the sea, sending them to the wholesaler. Thursday
sends smoke signals to the wholesaler extolling the virtues of the latest production run of
nuts that are drifting across the bay. Which of the following functions in the value chain is
Monday performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
Answer: A
8) Clemente Santiago has formed a business that sells carved gourmet coconuts. He has hired
five employees. The most senior is Friday, who manages the carving process. Monday is the
newest employee. She collects the coconuts. Tuesday takes calls from unhappy customers.
Wednesday tosses finished coconuts into the sea, sending them to the wholesaler. Thursday
sends smoke signals to the wholesaler extolling the virtues of the latest production run of
nuts that are drifting across the bay. Which of the following functions in the value chain is
Friday performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
Answer: B
9) Clemente Santiago has formed a business that sells carved gourmet coconuts. He has hired
five employees. The most senior is Friday, who manages the carving process. Monday is the
newest employee. She collects the coconuts. Tuesday takes calls from unhappy customers.
Wednesday tosses finished coconuts into the sea, sending them to the wholesaler. Thursday
sends smoke signals to the wholesaler extolling the virtues of the latest production run of
nuts that are drifting across the bay. Which of the following functions in the value chain is
Wednesday performing?
A) Inbound logistics
B) Operations
18
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) Outbound logistics
D) Marketing and sales
E) Service
Answer: C
10) Clemente Santiago has formed a business that sells carved gourmet coconuts. He has
hired five employees. The most senior is Friday, who manages the carving process. Monday is
the newest employee. She collects the coconuts. Tuesday takes calls from unhappy
customers. Wednesday tosses finished coconuts into the sea, sending them to the wholesaler.
Thursday sends smoke signals to the wholesaler extolling the virtues of the latest production
run of nuts that are drifting across the bay. Which of the following functions in the value chain
is Thursday performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
Answer: D
11) Clemente Santiago has formed a business that sells carved gourmet coconuts. He has
hired five employees. The most senior is Friday, who manages the carving process. Monday is
the newest employee. She collects the coconuts. Tuesday takes calls from unhappy
customers. Wednesday tosses finished coconuts into the sea, sending them to the wholesaler.
Thursday sends smoke signals to the wholesaler extolling the virtues of the latest production
run of nuts that are drifting across the bay. Which of the following functions in the value chain
is Tuesday performing?
A) Inbound logistics
B) Operations
C) Outbound logistics
D) Marketing and sales
E) Service
Answer: E
19
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Planning Systems
2.1 Describe the four parts of the data processing cycle and the major activities in each.
Answer: A
Answer: D
3) Which step below is not considered to be part of the data processing cycle?
A) data input
B) feedback from external sources
C) data storage
D) data processing
Answer: B
Answer: A
20
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) expenditure cycle.
C) financing cycle.
D) production cycle.
Answer: B
6) Many small businesses choose to outsource their payroll activities to firms that specialize in
providing payroll services. Dolores Yu operates a payroll processing business in Calabasas,
California. When she sends bills out to her clients, her work is part of her firm's
A) revenue cycle.
B) expenditure cycle.
C) financing cycle.
D) production cycle.
Answer: A
7) A delivery of inventory from a vendor, with whom a credit line is already established,
would be initially recorded in which type of accounting record and as part of what transaction
cycle?
A) purchases journal; expenditure cycle
B) general journal; expenditure cycle
C) general ledger; expenditure cycle
D) cash disbursements journal; production cycle
Answer: A
Answer: A
Answer: C
21
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
12) Identify the item below that is not one of the four different types of data processing
activities.
A) creating
B) reading
C) using
D) deleting
Answer: C
Answer: A
2.2 Describe documents and procedures used to collect and process transaction data.
Answer: D
2) For a retail business, a delivery of inventory, from a vendor (with whom there is an
established credit relationship) would be initially recorded in which type of accounting record
as part of which transaction cycle?
A) purchases journal; expenditure cycle
B) general journal; expenditure cycle
C) general ledger; expenditure cycle
D) cash disbursements journal; production cycle
Answer: A
3) Data must be collected about three facets of each business activity. What are they?
A) the business activity, the resources it affects, the people who participate
B) the business activity, the transactions it creates, the impact on the financial statements
C) the inputs, outputs and processes used
D) who is involved, what was sold, how much was paid
22
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: B
Answer: C
6) Common source documents for the revenue cycle include all of the following except
A) sales order.
B) receiving report.
C) delivery ticket.
D) credit memo.
Answer: B
Answer: D
8) Documents that are sent to customers or suppliers and then sent back to the company in
the course of a business transaction are known as
A) turnaround documents.
B) source documents.
C) input documents.
D) transaction documents.
23
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: C
11) Source documents generally help to improve accuracy in transaction processing because
A) they specify which information to collect.
B) logically related data can be grouped in the same area of the document.
C) they provide directions and steps for completing the form.
D) All of the above are correct.
Answer: D
Answer: C
Answer: C
14) The data processing method used by FedEx to track packages is an example of
24
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) real-time processing.
B) batch processing.
C) online batch processing.
D) real-time batch processing.
Answer: A
15) Street Smarts (SS) is a retailer located in Naperville, Illinois. During the peak tourist
season, it has average daily cash and credit card sales in excess of $7,000. What is the best
way for SS to ensure that sales data entry is efficient and accurate?
A) well-designed paper forms
B) source data automation
C) turnaround documents
D) sequentially numbered sales invoices
Answer: B
16) In Petaluma, California, electric power is provided to consumers by Pacific Power. Each
month Pacific Power mails bills to 86,000 households and then processes payments as they
are received. What is the best way for this business to ensure that payment data entry is
efficient and accurate?
A) well-designed paper forms
B) source data automation
C) turnaround documents
D) sequentially numbered bills
Answer: C
Answer: A
25
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
18) The Cape Fear Rocket Club heads out to the dunes of Cape Fear, Oregon every August to
pierce the sky with their fiery projectiles. An enterprising seller of t-shirts has devised a series
of designs that capture the spirit of the event in silk-screened splendor. His employees can be
found on many of the major intersections selling his products out of the backs of pickup
trucks. What is the best way for this business to ensure that sales data entry is efficient and
accurate?
A) well-designed paper forms
B) source data automation
C) turnaround documents
D) sequentially numbered forms
Answer: D
19) Which of the following statements about data processing methods is true?
A) Online real-time processing does not store data in a temporary file.
B) Batch processing cannot be used to update a master file.
C) Control totals are used to verify accurate processing in both batch and online batch
processing.
D) Online real-time processing is only possible with source data automation.
Answer: A
Answer: A
Answer: A
24) A purchase requisition is a common source document used to facilitate which business
activity?
26
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) customer sale
B) receipt of goods
C) inventory purchase
D) purchase request
Answer: D
1) Identify the statement below that is not true with regards to the accounts receivable
subsidiary ledger.
A) Every credit sale is entered individually into the subsidiary ledger.
B) Debits and credits in the subsidiary ledger must always equal.
C) The subsidiary ledgers play an important role in maintaining the accuracy of the data stored
in the AIS.
D) The total of the subsidiary ledgers must equal the control account.
Answer: B
2) Which of the following is not usually a consideration when designing a coding system?
A) government coding regulations
B) standardization
C) future expansion needs
D) ease of reporting
Answer: A
Answer: A
Answer: C
27
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) When the sum of all entries in the subsidiary ledger equals the balance in the
corresponding general ledger account, it is assumed that
A) the recording processes were accurate.
B) all source documents were recorded.
C) adjusting entries are not required.
D) no errors exist in the subsidiary ledger.
Answer: A
6) The general ledger account that corresponds to a subsidiary ledger account is known as
a(n)
A) dependent account.
B) control account.
C) credit account.
D) attribute account.
Answer: B
Answer: A
Answer: B, C
9) Product items are often coded with (select all that apply)
A) sequence codes.
B) block codes.
C) group codes.
D) mnemonic codes.
Answer: C, D
28
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
10) Identify the statement below that is false with regards to effective coding practices.
A) Codes should allow for growth.
B) Codes should be consistent with intended use.
C) Codes should be customized for each division of an organization.
D) Codes should be as simple as possible.
Answer: C
Answer: B
Answer: A
13) The efficiency of recording numerous business transactions can be best improved by the
use of
A) prenumbered source documents.
B) specialized journals.
C) posting references.
D) subsidiary ledgers.
Answer: B
Answer: A
29
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: C
Answer: B
Answer: B
30
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) record
D) transaction file
Answer: D
21) Catarina Boards is a skateboard retailer located in Pueblo, New Mexico. Catarina Boards is
a sole proprietorship that stocks an inventory of between 30 and 50 different skateboards.
Inventory is updated in real time by the AIS. If Catarina wishes to keep detailed information
about the purchase price of each skateboard in a place outside of the general ledger, it might
use a
A) relational ledger.
B) transaction file.
C) master file.
D) specific ledger.
Answer: B
22) Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis area.
Antia uses computer technology to provide superior customer service. The store's database
system was designed to make detailed information about each Japanese fan easily accessible
to her customers. Accordingly, the fan price and condition are provided for each fan, along
with many pictures of each fan. In Antia's database, the price of the Japanese fans is a(n)
A) entity.
B) attribute.
C) field.
D) record.
Answer: B
23) Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis area.
Antia uses computer technology to provide superior customer service. The store's database
system was designed to make detailed information about each Japanese fan easily accessible
to her customers. Accordingly, the fan price and condition are provided for each fan, along
with many pictures of each fan. In Antia's database, the data about each Japanese fan
represents a(n)
A) entity.
B) attribute.
C) field.
D) record.
Answer: D
31
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
24) Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis area.
Antia uses computer technology to provide superior customer service. The store's database
system was designed to make detailed information about each Japanese fan easily accessible
to her customers. Accordingly, the fan price and condition are provided for each fan, along
with many pictures of each fan. In Antia's database, the Japanese fans (as a whole) represent
a(n)
A) entity.
B) attribute.
C) field.
D) record.
Answer: A
25) Antia Carmie is the largest collector and retailer of Japanese fans in the St. Louis area.
Antia uses computer technology to provide superior customer service. The store's database
system was designed to make detailed information about each Japanese fan easily accessible
to her customers. Accordingly, the fan price and condition are provided for each fan, along
with many pictures of each fan. In Antia's database, the data about each Japanese fan's price
is stored in a(n)
A) entity.
B) attribute.
C) field.
D) record.
Answer: C
26) The coding technique most likely used for sales orders is
A) block code.
B) group code.
C) sequence code.
D) data code.
Answer: C
Answer: A
32
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: B
30) Data about which of the following facets of a business activity is most likely to be
recorded in a transaction file?
A) business activity
B) resources affected by the business activity
C) people who participate in the business activity
D) place the business activity occurs
Answer: A
31) Data about all of the following facets of a business activity are most likely to be recorded
in a master file except the
A) business activity.
B) resources affected by the business activity.
C) people who participate in the business activity.
D) place the business activity occurs.
Answer: A
33
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) Traditionally, most AIS have been designed so that both financial and operational data are
stored in a manner that facilitates their integration in reports.
Answer: D
2) The quality assurance department at a large manufacturing business enters data into the
AIS that is used to produce a weekly report that summarizes the proportion of defective units
in each product line. This is an example of
A) internal financial information.
B) internal nonfinancial information.
C) external financial information.
D) external nonfinancial information.
Answer: B
Answer: B
4) All of the following situations would likely be communicated in an exception report except
A) production stoppages.
B) weekly credit and cash sales comparison.
C) low inventory level.
D) expense variances outside acceptable range.
Answer: B
5) Which statement below regarding the AIS and managerial reports is false?
A) The AIS is best utilized for financial data while the management information system is best
utilized for operational data.
B) The AIS must be able to provide managers with detailed operational information about the
organization's performance.
C) Both financial and nonfinancial data are required for proper and complete evaluation of
organizational performance.
D) Most source documents capture both financial and nonfinancial data about business
transactions.
34
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
7) The existence of multiple systems which provide information can result in all of the
following except
A) redundancies.
B) discrepancies.
C) integration issues.
D) efficiency.
Answer: D
Answer: B
Answer: C
10) Identify the output below that an accounting information system can provide.
A) income statement
B) list of sales returns
C) exception reports
D) all of the above
Answer: D
2.5 Discuss how organizations use enterprise resource planning (ERP) systems to process
transactions and provide information.
35
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) Betty has a system that keeps track of the accounts payable and receivable for her plumbing
business. At the end of the year, the system helps her to prepare her taxes in just two hours.
C) Charlie keeps records of all his business records in a shoe box. Each week he enters all of the
data into spreadsheets that automatically generate purchase orders, based on predetermined
inventory reorder points. Production quotas for the coming week are also automatically
generated based on customer orders.
D) Doug is a freelance photographer. He keeps records of all expenses and revenues on his cell
phone and then e-mails them to himself every month. The files are stored on his personal
computer and backed up to CD quarterly.
Answer: C
2) In an ERP system, the module used to record data about transactions in the revenue cycle is
called
A) order to cash.
B) purchase to pay.
C) financial.
D) customer relationship management.
Answer: A
3) Implementation of an ERP system requires increased focus on all except which of the
following controls?
A) segregation of duties between custody, authorization, and recording
B) data entry controls on validity and accuracy
C) controls over access to data
D) appropriate disposal of hard copy reports
Answer: D
Answer: A
6) In an ERP system, the module used to record data about transactions in the disbursement
cycle is called
A) order to cash.
B) purchase to pay.
36
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) financial.
D) customer relationship management.
Answer: B
7) In an ERP system, the module used to record data about transactions in the production
cycle is called
A) order to cash.
B) purchase to pay.
C) manufacturing.
D) logistics.
Answer: C
Answer: C
Answer: A
Answer: C
11) All of the following are reasons that implementing a new ERP may fail except
A) employees may resist using the ERP system.
B) ERPs can take years to fully implement.
37
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: A
13) An ERP system might facilitate the purchase of direct materials by all of the following
except
A) selecting the best supplier by comparing bids.
B) preparing a purchase order when inventory falls to reorder point.
C) routing a purchase order to a purchasing agent for approval.
D) communicating a purchase order to a supplier.
Answer: A
38
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) Perhaps the most striking fact about natural disasters in relation to AIS controls is that
A) many companies in one location can be seriously affected at one time by a disaster.
B) losses are absolutely unpreventable.
C) there are a large number of major disasters every year.
D) disaster planning has largely been ignored in the literature.
Answer: A
2) Which of the following is the greatest risk to information systems and causes the greatest
dollar losses?
A) human errors and omissions
B) physical threats such as natural disasters
C) dishonest employees
D) fraud and embezzlement
Answer: A
3) Identify the threat below that is not one of the four types of threats faced by accounting
information systems.
A) natural and political disasters
B) software errors and equipment malfunctions
C) unintentional acts
D) system inefficiency
Answer: D
Answer: B
39
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
6) What was the first known cyber-attack intended to harm a real-world physical target?
A) Sasser
B) Stuxnet
C) Michelangelo
D) Doomsday
Answer: B
7) What agency did the United States create to use cyber weapons and to defend against
cyber attacks?
A) U.S. Cyber Command
B) Department of Network Security
C) Department of Cyber Defense
D) Department of Technology Strategy
Answer: A
Answer: B
Answer: C
5.2 Define fraud and describe both the different types of fraud and the process one follows to
perpetuate a fraud.
1) Seble wants to open a floral shop in a downtown business district. She doesn't have funds
enough to purchase inventory and pay six months'' rent up front. Seble approaches a good
friend, Zhou, to discuss the possibility of Zhou investing funds and becoming a 25% partner in
the business. After a lengthy discussion Zhou agrees to invest. Eight months later, Zhou and
40
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Seble have a major argument. In order for Zhou to sue Seble for fraud, all the following must
be true except
A) Zhou's decision to invest was primarily based on Seble's assertion that she had prior floral
retail experience.
B) Seble told Zhou she had worked at a floral shop for several years, when in fact she did not
have any prior experience in floral retail.
C) before Zhou invested, Seble prepared a detailed business plan and sales forecasts, and
provided Zhou with copies.
D) Zhou's 25% share of the business is worth substantially less than her initial investment.
Answer: C
Answer: A
Answer: C
Answer: A
41
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
6) Which of the following is not an example of one of the basic types of fraud?
A) While straightening the store at the end of the day, a shoe store employee finds and keeps an
expensive pair of sunglasses left by a customer.
B) An executive devised and implemented a plan to accelerate revenue recognition on a long-
term contract, which will allow the company to forestall filing for bankruptcy. The executive
does not own any stock, stock options or grants, and will not receive a bonus or perk because of
the overstated revenue.
C) A purchasing agent places a large order at higher-than-normal unit prices with a vendor that
gave the agent tickets to several football games.
D) A salesperson approves a large sales discount on an order from a company owned partially
by the salesperson's sister.
Answer: A
9) All of the following are required for an act to be legally classified as fraudulent except
A) a falsehood is made.
B) about a material fact.
C) to inflict pain.
D) resulting in a financial loss.
Answer: C
Answer: D
5.3 Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities,
and rationalizations that are present in most frauds.
42
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
2) Which of the following is not an example of the fraud triangle characteristic concerned with
rationalization?
A) revenge against the company
B) intent to repay "borrowed" funds in the future
C) sense of entitlement as compensation for receiving a lower than -average raise
D) belief that the company won't suffer because an insurance company will reimburse losses
Answer: A
Answer: D
Answer: A
Answer: A
6) Identify the opportunity below that could enable an employee to commit fraud.
A) An employee's spouse loses her job.
43
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
7) Which of the following is a financial pressure that could cause an employee to commit
fraud?
A) a feeling of not being appreciated
B) failing to receive a deserved promotion
C) believing that their pay is too low relative to others around them
D) having a spouse injured in a car accident and in the hospital for several weeks
Answer: D
8) Which of the following fraudulent acts generally takes most time and effort?
A) lapping accounts receivable
B) selling stolen inventory to get cash
C) stealing inventory from the warehouse
D) creating false journal entries to overstate revenue
Answer: A
9) In many cases of fraud, the ________ takes more time and effort than the ________.
A) concealment; theft
B) theft; concealment
C) conversion; theft
D) conversion; concealment
Answer: A
10) Which of the following is the best way to hide theft of assets?
A) creating "cash" through the transfer of money between banks
B) conversion of stolen assets into cash
C) stealing cash from customer A and then using customer B's balance to pay customer A's
accounts receivable
D) charging the stolen asset to an expense account
Answer: D
11) Which fraud scheme involves stealing customer receipts and applying subsequent
customer cash payments to cover the theft?
44
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) kiting
B) laundering
C) lapping
D) bogus expense
Answer: C
12) One fraudulent scheme covers up a theft by creating cash through the transfer of money
between banks. This is known as
A) lapping.
B) misappropriation of assets.
C) kiting.
D) concealment.
Answer: C
13) Which characteristic of the fraud triangle often stems from a lack of internal controls
within an organization?
A) pressure
B) opportunity
C) rationalization
D) concealment
Answer: B
14) Which situation below makes it easy for someone to commit a fraud?
A) placing excessive trust in key employees
B) inadequate staffing within the organization
C) unclear company policies
D) All of the above situations make it easy for someone to commit a fraud.
Answer: D
15) What is the most prevalent opportunity within most companies to commit fraud?
A) lack of any internal controls
B) failure to enforce the internal controls
C) loopholes in the design of internal controls
D) management's failure to believe employees would commit fraud
Answer: B
16) This component of the fraud triangle explains how perpetrators justify their (illegal)
45
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
behavior.
A) pressure
B) rationalization
C) concealment
D) opportunity
Answer: B
Answer: A
5.4 Define computer fraud and discuss the different computer fraud classifications.
Answer: C
Answer: D
3) Why is computer fraud often much more difficult to detect than other types of fraud?
A) because massive fraud can be committed in only seconds, leaving little-to-no evidence
B) because most perpetrators invest their illegal income rather than spend it, concealing key
evidence
C) because most computer criminals are older and more cunning than perpetrators of other
types of fraud
D) because perpetrators usually only steal very small amounts of money at a time, requiring a
long period of time to pass before discovery
46
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
4) Why is computer fraud often more difficult to detect than other types of fraud?
A) Rarely is cash stolen in computer fraud.
B) The fraud may leave little or no evidence it ever happened.
C) Computers provide more opportunities for fraud.
D) Computer fraud perpetrators are just more clever than other types of criminals.
Answer: B
Answer: D
6) The fraud that requires the least computer knowledge or skill involves
A) altering or falsifying source data.
B) unauthorized use of computers.
C) tampering with or copying software.
D) forging documents like paychecks.
Answer: A
Answer: A
47
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
5.5 Explain how to prevent and detect computer fraud and abuse.
Answer: B
2) Which of the following will not reduce the likelihood of an occurrence of fraud?
A) encryption of data and programs
B) use of forensic accountants
C) adequate insurance coverage
D) required vacations and rotation of duties
Answer: C
3) On Tuesday morning, Chen Lee, Chief Information Officer at American Trading Corporation
(ATC), got some bad news. The hard drive use to store system data backups was lost while it
was being transported to an offsite storage location. Chen called a meeting of her technical
staff to discuss the implications of the loss. Which of the following is most likely to relieve her
concerns over the potential cost of the loss?
A) ATC has a comprehensive disaster recovery plan.
B) The hard drive was encrypted and password protected.
C) The shipper has insurance that will reimburse ATC for the cost of the hard drive.
D) ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be
prepared.
Answer: B
4) ________ is a simple, yet effective, method for catching or preventing many types of
employee fraud.
A) Requiring all employees to take annual vacations
B) Monitoring employee bank accounts and net worth
C) Monitoring employee behavior using video cameras
D) Explaining that fraud is illegal and will be severely punished to employees
Answer: A
48
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
9) Which of the following is not a way to make fraud less likely to occur?
A) Adopt an organizational structure that minimizes the likelihood of fraud.
B) Create an organizational culture that stresses integrity and commitment to ethical values.
C) Create an audit trail so individual transactions can be traced.
D) Effectively supervise employees.
Answer: C
Answer: A
Answer: D
49
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
2) Individuals who use telephone lines to commit fraud and other illegal acts are typically
called
A) phreakers.
B) crackers.
C) phishers.
D) hackers.
Answer: A
Answer: A
4) Gaining control of somebody's computer without their knowledge and using it to carry out
illicit activities is known as
A) hacking.
B) sniffing.
C) phreaking.
D) hijacking.
Answer: D
50
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Tapping into a communications line and then entering the system by accompanying a
legitimate user without their knowledge is called
A) superzapping.
B) data leakage.
C) hacking.
D) piggybacking.
Answer: D
Answer: D
7) The deceptive method by which a perpetrator gains access to the system by pretending to
be an authorized user is called
A) cracking.
B) masquerading.
C) hacking.
D) superzapping.
Answer: B
Answer: A
9) A fraud technique that slices off tiny amounts from many projects is called the ________
technique.
A) Trojan horse
B) round down
C) salami
D) trap door
51
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: D
11) In the 1960s, techniques were developed that allowed individuals to fool the phone
system into providing free access to long distance phone calls. The people who use these
methods are referred to as
A) phreakers.
B) hackers.
C) hijackers.
D) superzappers.
Answer: A
12) During a routine audit, a review of cash receipts and related accounting entries revealed
discrepancies. Upon further analysis, it was found that figures had been entered correctly and
then subsequently changed, with the difference diverted to a fictitious customer account. This
is an example of
A) kiting.
B) data diddling.
C) data leakage.
D) phreaking.
Answer: B
13) LOLer was chatting online with l33ter. "I can't believe how lame some people are! :) I can
get into any system by checking out the company website to see how user names are defined
and who is on the employee directory. Then, all it takes is brute force to find the password."
LOLer is a ________, and the fraud he is describing is ________.
A) hacker; social engineering
B) phreaker; dumpster diving
C) hacker; password cracking
D) phreaker; the salami technique
52
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
14) After graduating from college with a communications degree, Rado Ionesco experienced
some difficulty in finding full-time employment. He free-lanced during the summer as a writer
and then started a blog in the fall. Shortly thereafter he was contacted by SitePromoter
Incorporated, who offered to pay him to promote their clients in his blog. He set up several
more blogs for this purpose and is now generating a reasonable level of income. He is
engaged in
A) splogging.
B) Bluesnarfing.
C) vishing.
D) typosquatting.
Answer: A
15) Computers that are part of a botnet and are controlled by a bot herder are referred to as
A) posers.
B) zombies.
C) botsquats.
D) evil twins.
Answer: B
16) Wassim Masood has been the webmaster for Woori Finance only ten days when Woori's
website was flooded with access attempts. Wassim shut down the site and only opened it to
Web addresses which he specifically identified as legitimate. As a result, many of Woori's
customers were unable to obtain loans, causing Woori to lose a significant amount of
business. Woori Finance suffered from a
A) denial-of-service attack.
B) zero-day attack.
C) malware attack.
D) cyber-extortion attack.
Answer: A
17) Wassim Masood has been the webmaster for Woori Finance only ten days when he
received an e-mail that threatened to shut down Woori's website unless Wassim wired
payment to an account in South America. Wassim was concerned that Woori Finance would
suffer huge losses if its website went down, so he wired money to the appropriate account.
The author of the e-mail successfully committed
A) a denial-of-service attack.
B) Internet terrorism.
53
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) hacking.
D) cyber-extortion.
Answer: D
18) Wassim Masood works in the information technology department of TMV. On Monday
morning, he arrived at work, scanned his identity card, and entered his code. At that moment,
a lady in a delivery uniform came up behind Wassim with a bunch of boxes. Although Wassim
held the door for the delivery lade, he later wondered if the delivery lady was engaged in
A) pretexting.
B) piggybacking.
C) posing.
D) spoofing.
Answer: B
Answer: C
21) Recall that students used Facebook and VKontakte to identify Russian money laundering
mules. What fraud case did these students help foil?
A) Zeus
B) Trident Breach
C) Nigerian Banking
D) InfraGard
Answer: B
22) On the weekends, Thuy Nguyen climbs into her Toyota Camry and drives around the city
of Las Vegas looking for unprotected wireless networks to exploit. Thuy is most likely
engaging in
A) snarfing.
B) Wi-pilfering.
C) war driving.
D) data slurping.
Answer: C
54
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
23) Offering a free website, then charging the phone bills of the individuals who signed up for
the free website is known as
A) snarfing.
B) web cramming.
C) podpounding.
D) e-scraping.
Answer: B
6.2 Explain how social engineering techniques are used to gain physical or logical access to
computer resources.
1) Mircea Vasilescu maintains an online brokerage account. In early March, Mircea received
an e-mail from the firm that explained that there had been a computer error and asked
Mircea to call a phone number to verify his customer information. When Mircea called the
number, a recording asked that he enter the code from the e-mail, his account number, and
his social security number. After he did so, he was told that he would be connected with a
customer service representative, but the connection was terminated. He contacted the
brokerage company and was informed that they had not sent the e-mail. Mircea was a victim
of
A) Bluesnarfing.
B) vishing.
C) splogging.
D) typosquatting.
Answer: B
2) When a computer criminal gains access to a system by searching through discarded records,
this is referred to as
A) data diddling.
B) dumpster diving.
C) eavesdropping.
D) data squatting.
Answer: B
3) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1
million of electronic equipment by
A) scavenging.
B) skimming.
C) Internet auction fraud.
55
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) cyber extortion.
Answer: A
4) Illegally obtaining and using confidential information about a person for economic gain is
known as
A) eavesdropping.
B) identity theft.
C) packet sniffing.
D) piggybacking.
Answer: B
Answer: D
6) Which of the following is the easiest method for a computer criminal to steal output
without ever being on the premises?
A) dumpster diving
B) use of a Trojan horse
C) using a telescope to peer at paper reports
D) electronic eavesdropping on computer monitors
Answer: D
7) Dimitri Ivanov is an accountant with PwC. The firm has a very strict policy of requiring all
users to change their passwords every sixty days. In early March, Dimitri received an e-mail
claiming that there had been an error updating his password and that provided a link to a
website with instructions for re-updating his password. Something about the e-mail made
Dimitri suspicious, so he called PwC's information technology department and found that the
e-mail was fictitious. The e-mail was an example of
A) social engineering.
B) piggybacking.
C) spamming.
D) phishing.
Answer: D
56
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
8) It was late on a Friday afternoon when Makari Polzin got a call at the help desk for Taggart
Transcontinental. A man with an edge of panic in his voice was on the phone. "I'm really in a
bind and I sure hope that you can help me." He identified himself as John Galt from the
Accounting Department. He told Makari that he had to work on a report that was due on
Monday morning and that he had forgotten to bring a written copy of his new password home
with him. Makari knew that Taggart's new password policy required that passwords be at
least fifteen characters long, must contain letters and numbers, and must be changed every
sixty days, had created problems. Consequently, Makari provided the password to John. The
caller was not John Galt, and Makari was a victim of
A) phreaking.
B) war dialing.
C) identity theft.
D) social engineering.
Answer: D
9) Jim Chan decided to Christmas shop online. He linked to Amazon.com, found a perfect gift
for his daughter, registered, and placed his order. It was only later that he noticed that the
website's URL was actually Amazom.com. Jim was a victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
D) typosquatting.
Answer: D
10) Mo Chauncey was arrested in Emporia, Kansas, on February 29, 2008, for running an
online business that specialized in buying and reselling stolen credit card information. Mo was
charged with
A) typosquatting.
B) carding.
C) pharming.
D) phishing.
Answer: B
57
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
14) Which of the following is not a human trait social engineers take advantage of to entice
people to reveal information they should keep confidential?
A) compassion
B) sloth
C) sex Appeal
D) authority
Answer: D
15) Which of the following websites likely poses the most fraud and security risk?
A) your school's website
B) a file sharing website
C) a social media website
D) your personal website
Answer: B
Answer: B
18) On a Friday evening you use a bar's ATM to withdraw $50 from your bank account.
However, as you complete your withdrawal, your card gets jammed in the ATM machine. The
individual waiting in line behind you approaches you and suggests re-entering your PIN
number. You do. However, your card remains jammed. You leave the bar to call your bank to
report the incident. However, after you left the individual who offered to help you removed a
sleeve he inserted in the ATM to jam your card. He now has your ATM card and PIN number.
You just fell victim to a ________ fraud.
A) tabnapping
B) Lebanese looping
C) phishing
D) pharming
58
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
1) A part of a program that remains idle until a specified date or event activates it to cause
havoc is called a
A) virus.
B) logic bomb.
C) trap door.
D) data diddle.
Answer: B
2) Spyware is
A) software that tells the user if anyone is spying on his computer.
B) software that monitors whether spies are looking at the computer.
C) software that monitors computing habits and sends the data it gathers to someone else.
D) none of the above
Answer: C
3) The unauthorized use of special program that bypass regular system controls to perform
illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer: D
4) Computer fraud perpetrators that modify programs during systems development, allowing
access into the system that bypasses normal system controls are using
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Answer: B
5) A fraud technique that allows a perpetrator to bypass normal system controls and enter a
secured system is called
A) superzapping.
59
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) data diddling.
C) using a trap door.
D) piggybacking.
Answer: C
Answer: D
7) A ________ is similar to a ________, except that it is a program rather than a code segment
hidden in a host program.
A) worm; virus
B) Trojan horse; worm
C) worm; Trojan horse
D) virus; worm
Answer: A
8) Developers of computer systems often include a user name and password that is hidden in
the system, just in case they need to get into the system and correct problems in the future.
This is referred to as a
A) Trojan horse.
B) key logger.
C) spoof.
D) back door.
Answer: D
9) Narang Direct Sales is a telemarketing firm that operates out of India. The turnover rate
among employees is quite high. Recently, the information technology manager discovered
that an unknown employee had used a Bluetooth-enabled mobile phone to access the firm's
database and copied a list of customers from the past three years and their credit card
information. Narang Direct Sales was a victim of
A) Bluesnarfing.
B) splogging.
C) vishing.
60
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) typosquatting.
Answer: A
10) Rina Misra, a first-time computer user, purchased a brand new PC two months ago and it
was now operating much more slowly and sluggishly. Since purchasing the computer, she had
been accessing the Internet and had installed a variety of free software. The problem is
mostly likely to be
A) a zero-day attack.
B) a virus.
C) a spoof.
D) Bluesnarfing.
Answer: B
11) In November of 2005 it was discovered that many of the new CDs distributed by Sony
BMG installed software when they were played on a computer. The software was intended to
protect the CDs from copying. Unfortunately, it also made the computer vulnerable to attack
by malware run over the Internet. The scandal and resulting backlash was very costly. The
software installed by the CDs is a
A) virus.
B) worm.
C) rootkit.
D) squirrel.
Answer: C
12) Which of the following would be least effective to reduce exposure to a computer virus?
A) Only transfer files between employees with USB flash drives.
B) Install and frequently update antivirus software.
C) Install all new software on a stand-alone computer for until it is tested.
D) Do not open e-mail attachments from unknown senders.
Answer: A
15) Spyware that pops banner ads on a monitor, then collects information about the users
web-surfing and spending habits is an example of
A) a Trojan horse
B) scareware
C) adware
D) a keylogger
61
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: A
18) Terrorists often use ________ because it is an effective way to transmit information and
receive orders.
A) steganography
B) packet sniffers
C) trap doors
D) time bombs
Answer: A
62
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
7.1 Explain basic control concepts and explain why computer control and security are
important.
Answer: A
2) A control procedure designed so that the employee that records cash received from
customers does not also have access to the cash itself is an example of a(n)
A) preventive control.
B) detective control.
C) corrective control.
D) authorization control.
Answer: A
Answer: B
4) According to The Sarbanes-Oxley Act of 2002, the audit committee of the board of directors
is directly responsible for
A) hiring and firing the external auditors.
B) performing tests of the company's internal control structure.
C) certifying the accuracy of the company's financial reporting process.
D) overseeing day-to-day operations of the internal audit department.
Answer: A
63
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Which of the following measures can protect a company from AIS threats?
A) Take a proactive approach to eliminate threats.
B) Detect threats that do occur.
C) Correct and recover from threats that do occur.
D) All of the above are proper measures for the accountant to take.
Answer: D
Answer: C
Answer: B
8) Which type of control is associated with making sure an organization's control environment
is stable?
A) general
B) application
C) detective
D) preventive
Answer: A
9) Which type of control prevents, detects, and corrects transaction errors and fraud?
A) general
64
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) application
C) detective
D) preventive
Answer: B
10) The primary purpose of the Foreign Corrupt Practices Act of 1977 was
A) to require corporations to maintain a good system of internal control.
B) to prevent the bribery of foreign officials by American companies.
C) to require the reporting of any material fraud by a business.
D) All of the above are required by the act.
Answer: B
11) Congress passed this federal law for the purpose of preventing financial statement fraud,
to make financial reports more transparent and to strengthen the internal control of public
companies.
A) Foreign Corrupt Practices Act of 1977
B) The Securities Exchange Act of 1934
C) The Sarbanes-Oxley Act of 2002
D) The Control Provision of 1998
Answer: C
12) Which of the following was not an important change introduced by the Sarbanes-Oxley
Act of 2002?
A) new roles for audit committees
B) new rules for auditors and management
C) new rules for information systems development
D) the creation of the Public Company Accounting Oversight Board
Answer: C
13) A(n) ________ measures company progress by comparing actual performance to planned
performance.
A) boundary system
B) diagnostic control system
65
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
14) A(n) ________ helps top-level managers with high-level activities that demand frequent
and regular attention.
A) boundary system
B) diagnostic control system
C) interactive control system
D) internal control system
Answer: C
15) Which of the following is not a violation of the Sarbanes-Oxley Act (SOX)? The
management at Oanez Dinnerware
A) asked their auditors to make recommendations for the redesign of their information
technology system and to aid in the implementation process.
B) hired the manager from the external audit team as company CFO twelve months after the
manager had worked on the audit.
C) selected the company's Chief Financial Officer to chair the audit committee.
D) did not mention to auditors that the company had experienced significant losses due to fraud
during the past year.
Answer: B
Answer: D
17) Irene Pacifica was relaxing after work with a colleague at a local watering hole. Well into
her second martini, she began expressing her feelings about her company's budgeting
practices. It seems that as a result of controls put in place by the company, her ability to
66
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
creatively manage his department's activities have been curtailed. The level of control that
the company is using in this case is a(n)
A) boundary system.
B) diagnostic control system.
C) interactive control system.
D) belief system.
Answer: B
18) Irene Pacifica was relaxing after work with a colleague at a local watering hole. Well into
her second martini, she began expressing her feelings about her work environment. Recently,
every employee of the firm was required to attend a sexual harassment workshop. The level
of control that the company is using in this case is a(n)
A) boundary system.
B) diagnostic control system.
C) interactive control system.
D) belief system.
Answer: A
7.2 Compare and contrast the COBIT, COSO, and ERM control frameworks.
Answer: D
67
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
3) Nolwenn Limited has been diligent in ensuring that their operations meet modern control
standards. Recently, they have extended their control compliance system by incorporating
policies and procedures that require the specification of company objectives, uncertainties
associated with objectives, and contingency plans. Nolwenn Limited is transitioning from a
________ to a ________ control framework.
A) COSO-Integrated Framework; COBIT
B) COBIT; COSO-Integrated Framework
C) COBIT; COSO-ERM
D) COSO-Integrated Framework; COSO-ERM
E) COSO-ERM; COBIT
Answer: D
6) How many principles are there in the 2013 updated COSO - Internal Control Framework?
A) 5
B) 8
C) 17
D) 21
Answer: C
7) Why was the original 1992 COSO - Integrated Control framework updated in 2013?
A) Congress required COSO to modernize.
B) U.S. stock exchanges required more disclosure.
C) to more effectively address technological advancements
D) to comply with International accounting standards
Answer: C
8) Which internal control framework is widely accepted as the authority on internal controls?
A) COBIT
B) COSO Integrated Control
C) COSO Enterprise Risk Management
D) Sarbanes-Oxley Control Framework
68
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
9) Identify the statement below that is not true of the 2013 COSO Internal Control updated
framework.
A) It more efficiently deals with control implementation and documentation issues.
B) It more effectively deals with control implementation and documentation issues.
C) It provides users with more precise guidance.
D) It adds many new examples to clarify the framework concepts.
Answer: A
10) Which of the following is not one of the five principles of COBIT5?
A) meeting stakeholder needs
B) covering the enterprise end-to-end
C) enabling a holistic approach
D) improving organization efficiency
Answer: D
Answer: C
Answer: D
69
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) the CEO.
B) the CFO.
C) the board of directors.
D) all of the above
Answer: D
14) Why did COSO develop the Enterprise Risk Management framework?
A) to improve the audit process
B) to improve the risk management process
C) to improve the financial reporting process
D) to improve the manufacturing process
Answer: B
15) Which of the following is not a basic principle of the COSO ERM framework?
A) Companies are formed to create value for society.
B) Management must decide how much uncertainty it will accept to create value.
C) Uncertainty results in risk.
D) Uncertainty results in opportunity.
Answer: A
16) The largest differences between the COSO Integrated Control (IC) framework and the
COSO Enterprise Risk Management (ERM) framework is
A) IC is controls-based, while the ERM is risk-based.
B) IC is risk-based, while ERM is controls-based.
C) IC is required, while ERM is optional.
D) IC is more applicable to international accounting standards, while ERM is more applicable to
generally accepted accounting principles.
Answer: A
1) Rauol is a receptionist for The South American Paper Company, which has strict corporate
policies on appropriate use of corporate resources. The first week of March, Rauol saw Jim
70
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
(the branch manager) putting printer paper and toner into his briefcase on his way out the
door. This situation best reflects a weakness in which aspect of internal environment, as
discussed in the COSO Enterprise Risk Management Framework?
A) integrity and ethical values
B) risk management philosophy
C) restrict access to assets
D) methods of assigning authority and responsibility
Answer: A
2) Which of the following is not a factor of internal environment according to the COSO
Enterprise Risk Management Framework?
A) analyzing past financial performance and reporting
B) providing sufficient resources to knowledgeable employees to carry out duties
C) disciplining employees for violations of expected behavior
D) setting realistic targets for long-term performance
Answer: A
Answer: C
4) The definition of the lines of authority and responsibility and the overall framework for
planning, directing, and controlling is laid out by the
A) control activities.
B) organizational structure.
C) budget framework.
D) internal environment.
Answer: B
71
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
6) Personnel policies such as background checks, mandatory vacations, and rotation of duties
tend to deter
A) unintentional errors.
B) employee fraud or embezzlement.
C) fraud by outsiders.
D) disgruntled employees.
Answer: B
7) The SEC and FASB are best described as external influences that directly affect an
organization's
A) hiring practices.
B) philosophy and operating style.
C) internal environment.
D) methods of assigning authority.
Answer: C
8) Which attribute below is not an aspect of the COSO ERM Framework internal environment?
A) enforcing a written code of conduct
B) holding employees accountable for achieving objectives
C) restricting access to assets
D) avoiding unrealistic expectations
Answer: C
9) The amount of risk a company is willing to accept in order to achieve its goals and
objectives is
72
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) inherent risk.
B) residual risk.
C) risk appetite.
D) risk assessment.
Answer: C
7.4 Describe the four types of control objectives that companies need to set.
1) According to the ERM, these help the company address all applicable laws and regulations.
A) compliance objectives
B) operations objectives
C) reporting objectives
D) strategic objectives
Answer: A
2) According to the ERM, high level goals that are aligned with and support the company's
mission are
A) compliance objectives.
B) operations objectives.
C) reporting objectives.
D) strategic objectives.
Answer: D
3) According to the ERM, ________ deal with the effectiveness and efficiency of company
operations, such as performance and profitability goals.
A) compliance objectives
B) operations objectives
C) reporting objectives
D) strategic objectives
Answer: B
4) ________ objectives help ensure the accuracy, completeness and reliability of internal and
external company reports, Applying the ERM framework.
73
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Compliance objectives
B) Operations objectives
C) Reporting objectives
D) Strategic objectives
Answer: C
7.5 Describe the events that affect uncertainty and the techniques used to identify them.
Answer: B
3) Which of the following is not a commonly used technique used to identify potential
events?
A) performing internal analysis
B) monitoring leading events
C) conducting interviews
D) none of the above
Answer: D
7.6 Explain how to assess and respond to risk using the Enterprise Risk Management (ERM)
model.
1) ________ is not a risk responses identified in the COSO Enterprise Risk Management
Framework.
A) Acceptance
B) Avoidance
C) Monitoring
D) Sharing
Answer: C
74
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
2) Best Friends, Incorporated is a publicly traded company where three BFF's (best friends
forever) serve as its key officers. This situation
A) is a violation of the Sarbanes-Oxley Act.
B) violates the Securities and Exchange Act.
C) increases the risk associated with an audit.
D) must be changed before your audit firm could accept the audit engagement.
Answer: C
Answer: B
4) ________ is the risk that exists before management takes any steps to mitigate it.
A) Inherent risk
B) Residual risk
C) Risk appetite
D) Risk assessment
Answer: A
Answer: B
75
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
7) Whitewater Rapids provides canoes to tourists eager to ride Whitewater River's rapids.
Management has determined that there is one chance in a thousand of a customer being
injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance
with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence
of criminal negligence. What is the impact of this risk without insurance?
A) $50
B) $650
C) $50,000
D) $650,000
Answer: D
8) Whitewater Rapids provides canoes to tourists eager to ride Whitewater river's rapids.
Management has determined that there is one chance in a thousand of a customer being
injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance
with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence
of criminal negligence. What is the expected loss without insurance?
A) $50
B) $650
C) $50,000
D) $650,000
Answer: B
9) Whitewater Rapids provides canoes to tourists eager to ride Whitewater river's rapids.
Management has determined that there is one chance in a thousand of a customer being
injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance
with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence
of criminal negligence. What is the expected loss with insurance?
A) $50
B) $650
C) $50,000
76
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) $650,000
Answer: A
10) Whitewater Rapids provides canoes to tourists eager to ride Whitewater river's rapids.
Management has determined that there is one chance in a thousand of a customer being
injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance
with a $50,000 deductible is available. It covers the costs of lawsuits, unless there is evidence
of criminal negligence. Based on cost-benefit analysis, what is the most that the business
should pay for the insurance?
A) $50
B) $500
C) $600
D) $650
Answer: C
11) According to the COSO Enterprise Risk Management Framework, the risk assessment
process incorporates all of the following components except
A) reporting potential risks to auditors.
B) identifying events that could impact the enterprise.
C) evaluating the impact of potential events on achievement of objectives.
D) establishing objectives for the enterprise.
Answer: A
12) As a result of an internal risk assessment, Allstate Insurance decided it was not profitable
to provide hurricane insurance in the state of Florida. Allstate apparently chose to ________
the risk of paying hurricane claims in Florida.
A) reduce
B) share
C) avoid
D) accept
Answer: C
77
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
13) Upon getting into your new car, you suddenly became worried that you might become
injured in an auto accident. You decided to buckle your seat belt in response. You chose to
________ the risk of being injured in an auto accident.
A) reduce
B) share
C) avoid
D) accept
Answer: A
14) Upon getting into your new car, you suddenly became worried that you might become
injured in an auto accident. In response, you decided to drive 5 miles under the speed limit.
You chose to ________ the risk of being injured in an auto accident.
A) reduce
B) share
C) avoid
D) accept
Answer: A
15) Upon getting into your new car, you suddenly became worried that you might become
injured in an auto accident. In response, you decided to ride your bike instead. You chose to
________ the risk of being injured in an auto accident.
A) reduce
B) share
C) avoid
D) accept
Answer: C
1) At a movie theater box office, all tickets are sequentially prenumbered. At the end of each
day, the beginning ticket number is subtracted from the ending number to calculate the
number of tickets sold. Then, ticket stubs collected at the theater entrance are counted and
compared with the number of tickets sold. Which of the following situations does this control
detect?
78
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Some customers presented tickets purchased on a previous day when there wasn't a ticket
taker at the theater entrance (so the tickets didn't get torn.)
B) A group of kids snuck into the theater through a back door when customers left after a show.
C) The box office cashier accidentally gives too much change to a customer.
D) The ticket taker admits his friends without tickets.
Answer: A
2) At a movie theater box office, all tickets are sequentially prenumbered. At the end of each
day, the beginning ticket number is subtracted from the ending number to calculate the
number of tickets sold. Cash is counted and compared with the number of tickets sold. Which
of the following situations does this control detect?
A) Some customers presented tickets purchased on a previous day when there wasn't a ticket
taker at the theater entrance (so the tickets didn't get torn.)
B) A group of kids snuck into the theater through a back door when customers left after a show.
C) The box office cashier accidentally gives too much change to a customer.
D) The ticket taker admits his friends without tickets.
Answer: C
Answer: A
Answer: D
79
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
6) Of the following examples of fraud, which will be the most difficult to prevent and detect?
Assume the company enforces adequate segregation of duties.
A) A mail room employee steals a check received from a customer and destroys the
documentation.
B) The accounts receivable clerk does not record sales invoices for friends or family, so they can
receive free goods.
C) An employee puts inventory behind the dumpster while unloading a vendor's delivery truck,
then picks up the inventory later in the day and puts it in her car.
D) Mike issues credit cards to him and Maxine, and when the credit card balances are just under
$1,000, Maxine writes off the accounts as bad debt. Mike then issues new cards.
Answer: D
7) Which of the following is a control related to design and use of documents and records?
A) locking blank checks in a drawer or safe
B) sequentially prenumbering sales invoices
C) reconciling the bank statement to the general ledger
D) comparing physical inventory counts with perpetual inventory records
Answer: B
8) Which of the following duties could be performed by the same individual without violating
segregation of duties controls?
A) approving accounting software change requests and testing production scheduling software
changes
B) programming new code for accounting software and testing accounting software upgrades
C) approving software changes and implementing the upgraded software
80
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) managing accounts payable function and revising code for accounting software to more
efficiently process discount due dates on vendor invoices
Answer: A
9) With a limited work force and a desire to maintain strong internal control, which
combination of duties would result in the lowest risk exposure?
A) updating the inventory subsidiary ledgers and recording purchases in the purchases journal
B) approving a sales return on a customer's account and depositing customers' checks in the
bank
C) updating the general ledger and working in the inventory warehouse
D) entering payments to vendors in the cash disbursements journal and entering cash received
from customers in the cash receipts journal
Answer: D
10) A store policy that allows retail clerks to process sales returns for $500 or less, with a
receipt dated within the past 30 days, is an example of
A) general authorization.
B) specific authorization.
C) special authorization.
D) generic authorization.
Answer: A
11) An accounting policy that requires a purchasing manager to sign off on all purchases over
$5,000 is an example of
A) general authorization.
B) specific authorization.
C) special authorization.
D) generic authorization.
Answer: B
12) A document that shows all projects that must be completed and the related IT needs in
order to achieve long-range company goals is known as a
A) performance evaluation.
81
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
13) A ________ is created to guide and oversee systems development and acquisition.
A) performance evaluation
B) project development plan
C) steering committee
D) strategic master plan
Answer: C
14) A ________ shows how a project will be completed, including tasks and who will perform
them as well as a timeline and cost estimates.
A) performance evaluation
B) project development plan
C) steering committee
D) strategic master plan
Answer: B
15) The organization chart for Renata Corporation includes a controller and an information
processing manager, both of whom report to the vice president of finance. Which of the
following would be a control weakness?
A) assigning the programming and operating of the computer system to an independent control
group which reports to the controller
B) providing for maintenance of input data controls by an independent control group which
reports to the controller
C) periodically rotating assignment of application processing among machine operators, who all
report to the information processing manager
D) providing for review and distribution of system-generated reports by an independent control
group which reports to the controller
Answer: A
82
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
17) Petty cash is disbursed by the Manuela Luisina in the Cashier's Office. Manuela also
maintains records of disbursements, places requests to the Finance Department to replace
expended funds, and periodically reconciles the petty cash balance. This represents a(n)
________ segregation of duties.
A) ideal
B) effective
C) ineffective
D) limited
Answer: C
18) Hiring decisions at Maarja's Razors are made by Maimu Maarja, the Director of Human
Resources. Pay rates are approved by the Vice President for Operations. At the end of each
pay period, supervisors submit time cards to Kasheena, who prepares paycheck requisitions.
Paychecks are then distributed through the company's mail room. This represents a(n)
________ segregation of duties.
A) partial
B) effective
C) ineffective
D) limited
Answer: B
19) The Director of Information Technology for the city of Tampa, Florida formed a company
to sell computer supplies and software. All purchases made on behalf of the City were made
83
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
from her company. She was later charged with fraud for overcharging the City, but was not
convicted by a jury. The control issue in this case arose because the Director had both
________ and ________ duties.
A) custody; authorization
B) custody; recording
C) recording; authorization
D) management; custody
Answer: C
7.8 Describe how to communicate information and monitor control processes in organizations.
Answer: A
2) Which of the following is not a principle related to information and communicating in the
updated COSO Integrated Control framework?
A) Communicate relevant internal control matters to external parties.
B) Obtain or generate relevant, high-quality information to support internal control.
C) Surround internal control processes with information technology that enables discrepancies
to be identified.
D) Internally communicate the information necessary to support the other components of
internal control.
Answer: C
3) COSO requires that any internal deficiencies identified through monitoring be reported to
whom?
A) the external auditor
B) appropriate federal, state, or local authorities
84
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: B
5) To ensure compliance with copyrights and to protect itself from software piracy lawsuits,
companies should ________.
A) periodically conduct software audits
B) update the operating system frequently
C) buy software from legitimate suppliers
D) adopt cloud operating platforms
Answer: A
Answer: D
85
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
8) Which type of audit assesses employee compliance with management policies and
procedures?
A) external audit
B) internal audit
C) network security audit
D) all of the above
Answer: B
9) Which of the following factors is not a reason forensic investigators are increasingly used in
accounting?
A) the Sarbanes-Oxley Act
B) new accounting rules
C) audit fee increases
D) pressure from boards of directors
Answer: C
Answer: B
86
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
87
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) The Trust Services Framework reliability principle that states that users must be able to
enter, update, and retrieve data during agreed-upon times is known as
A) availability.
B) security.
C) maintainability.
D) integrity.
Answer: A
2) According to the Trust Services Framework, the reliability principle of integrity is achieved
when the system produces data that
A) is available for operation and use at times set forth by agreement.
B) is protected against unauthorized physical and logical access.
C) can be maintained as required without affecting system availability, security, and integrity.
D) is complete, accurate, and valid.
Answer: D
3) Kuzman Jovan called a meeting of the top management at Jovan Capital Management.
Number one on the agenda was computer system security. "The risk of security breach
incidents has become unacceptable," he said, and turned to the Chief Information Officer.
"What do you intend to do?" Which of the following is the best answer?
A) Evaluate and modify the system using COBOL.
B) Evaluate and modify the system using the CTC checklist.
C) Evaluate and modify the system using the Trust Services framework
D) Evaluate and modify the system using the COSO Internal Control Framework.
Answer: C
4) Which of the following is not one of the three fundamental information security concepts?
A) Information security is a technology issue based on prevention.
B) Security is a management issue, not a technology issue.
C) The idea of defense-in-depth employs multiple layers of controls.
D) The time-based model of security focuses on the relationship between preventive, detective
and corrective controls.
Answer: A
88
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Which of the following is not one of the essential criteria for successfully implementing
each of the principles that contribute to systems reliability, as discussed in the Trust Services
Framework?
A) developing and documenting policies
B) effectively communicating policies to all outsiders
C) designing and employing appropriate control procedures to implement policies
D) monitoring the system and taking corrective action to maintain compliance with policies
Answer: B
6) If the time an attacker takes to break through the organization's preventive controls is
greater than the sum of the time required to detect the attack and the time required to
respond to the attack, then security is
A) effective.
B) ineffective.
C) overdone.
D) undermanaged.
Answer: A
7) It was 8:03 A.M. when Jiao Jan, the Network Administrator for South Asian Technologies,
was informed that the intrusion detection system had identified an ongoing attempt to
breach network security. By the time that Jiao had identified and blocked the attack, the
hacker had accessed and downloaded several files from the company's server. Using the
notation for the time-based model of security, in this case
A) D > P
B) P > D
C) P > C
D) C > P
Answer: A
8) There are "white hat" hackers and "black hat" hackers. Cowboy451 was one of the "black
hat" hackers. He had researched an exploit and determined that he could penetrate the target
system, download a file containing valuable data, and cover his tracks in eight minutes. Six
89
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
minutes into the attack he was locked out of the system. Using the notation of the time-based
model of security, which of the following must be true?
A) P < 6
B) D = 6
C) P = 6
D) P > 6
Answer: D
9) Identify a party below who was involved with developing the Trust Services Framework.
A) FASB
B) United States Congress
C) AICPA
D) IMA
Answer: C
Answer: A
11) Identify one aspect of systems reliability that is not a source of concern with regards to a
public cloud.
A) confidentiality
B) privacy
C) efficiency
D) availability
Answer: C
12) Identify the primary means of protecting data stored in a cloud from unauthorized access.
A) authentication
B) authorization
90
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) virtualization
D) securitization
Answer: A
Answer: A
16) The Trust Services Framework reliability principle that states sensitive information be
protected from unauthorized disclosure is known as
A) availability.
B) security.
C) confidentiality.
D) integrity.
Answer: C
17) The Trust Services Framework reliability principle that states personal information should
be protected from unauthorized disclosure is known as
A) availability.
B) security.
C) privacy.
D) integrity.
Answer: C
18) The Trust Services Framework reliability principle that states access to the system and its
data should be controlled and restricted to legitimate users is known as
A) availability.
B) security.
C) privacy.
D) integrity.
91
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
8.2 Discuss how a combination of preventive, detective, and corrective controls can be
employed to provide reasonable assurance about the security of an organization's information
system.
1) Identify the statement below which is not a useful control procedure regarding access to
system outputs.
A) restricting access to rooms with printers
B) coding reports to reflect their importance
C) allowing visitors to move through the building without supervision
D) requiring employees to log out of applications when leaving their desk
Answer: C
2) Verifying the identity of the person or device attempting to access the system is an example
of
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
Answer: A
3) Restricting access of users to specific portions of the system as well as specific tasks, is an
example of
A) authentication.
B) authorization.
C) identification.
D) threat monitoring.
Answer: B
92
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) Log analysis
D) Intrusion detection
Answer: B
Answer: D
Answer: D
Answer: B
8) Multi-factor authentication
A) involves the use of two or more basic authentication methods.
B) is a table specifying which portions of the systems users are permitted to access.
C) provides weaker authentication than the use of effective passwords.
D) requires the use of more than one effective password.
Answer: A
93
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
10) Perimeter defense is an example of which of the following preventive controls that are
necessary to provide adequate security?
A) training
B) controlling physical access
C) controlling remote access
D) host and application hardening
Answer: C
11) Which of the following preventive controls are necessary to provide adequate security for
social engineering threats?
A) controlling remote access
B) encryption
C) host and application hardening
D) awareness training
Answer: D
12) A special purpose hardware device or software running on a general purpose computer,
which filters information that is allowed to enter and leave the organization's information
system, is known as a(n)
A) demilitarized zone.
B) intrusion detection system.
C) intrusion prevention system.
D) firewall.
Answer: D
94
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
13) This protocol specifies the procedures for dividing files and documents into packets to be
sent over the Internet.
A) access control list
B) Internet protocol
C) packet switching protocol
D) transmission control protocol
Answer: D
14) This protocol specifies the structure of packets sent over the internet and the route to get
them to the proper destination.
A) access control list
B) Internet protocol
C) packet switching protocol
D) transmission control protocol
Answer: B
15) This network access control determines which IP packets are allowed entry to a network
and which are dropped.
A) access control list
B) deep packet inspection
C) stateful packet filtering
D) static packet filtering
Answer: A
16) Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and
data files the users are authorized to access or manipulate.
A) validity test
B) biometric matrix
C) logical control matrix
D) access control matrix
Answer: D
95
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
17) The process that screens individual IP packets based solely on the contents of the source
and/or destination fields in the packet header is known as
A) access control list.
B) deep packet inspection.
C) stateful packet filtering.
D) static packet filtering.
Answer: D
18) The process of maintaining a table listing all established connections between the
organization's computers and the internet to determine whether an incoming packet is part of
an ongoing communication initiated by an internal computer is known as
A) stateful packet filtering.
B) deep packet inspection.
C) access control list.
D) static packet filtering.
Answer: A
19) The process that allows a firewall to be more effective by examining the data in the body
of an IP packet, instead of just the header, is known as
A) deep packet inspection.
B) stateful packet filtering.
C) static packet filtering.
D) an intrusion prevention system.
Answer: A
20) The security technology that evaluates IP packet traffic patterns in order to identify
attacks against a system is known as
A) an intrusion prevention system.
B) stateful packet filtering.
C) static packet filtering.
D) deep packet inspection.
Answer: A
96
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
21) This is used to identify rogue modems (or by hackers to identify targets).
A) war chalking
B) war dialing
C) war driving
D) none of the above
Answer: B
22) The process of turning off unnecessary features in the system is known as
A) deep packet inspection.
B) hardening.
C) intrusion detection.
D) war dialing.
Answer: B
Answer: A
24) Which of the below keeps a record of the network traffic permitted to pass through a
firewall?
A) intrusion detection system
B) vulnerability scan
C) log analysis
D) penetration test
Answer: A
25) The process that uses automated tools to identify whether a system possesses any well-
known security problems is known as a(n)
A) intrusion detection system.
B) log analysis.
97
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) penetration test.
D) vulnerability scan.
Answer: D
26) This is an authorized attempt by an internal audit team or an external security consultant
to attempt to break into the organization's information system.
A) log analysis
B) intrusion detection system
C) penetration test
D) vulnerability scan
Answer: C
27) A well-known hacker started his own computer security consulting business shortly after
being released from prison. Many companies pay him to attempt to gain unauthorized access
to their network. If he is successful, he offers advice as to how to design and implement
better controls. What is the name of the testing for which the hacker is being paid?
A) penetration test
B) vulnerability scan
C) deep packet inspection
D) buffer overflow test
Answer: A
28) The ________ disseminates information about fraud, errors, breaches and other improper
system uses and their consequences.
A) chief information officer
B) chief operations officer
C) chief security officer
D) computer emergency response team
Answer: C
29) In 2007, a major U.S. financial institution hired a security firm to attempt to compromise
its computer network. A week later, the firm reported that it had successfully entered the
98
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
system without apparent detection and presented an analysis of the vulnerabilities that had
been found. This is an example of a
A) preventive control.
B) detective control.
C) corrective control.
D) standard control.
Answer: B
30) Which of the following is commonly true of the default settings for most commercially
available wireless access points?
A) The security level is set at the factory and cannot be changed.
B) Wireless access points present little danger of vulnerability so security is not a concern.
C) Security is set to the lowest level that the device is capable of.
D) Security is set to the highest level that the device is capable of.
Answer: C
31) In recent years, many of the attacks carried out by hackers have relied on this type of
vulnerability in computer software.
A) code mastication
B) boot sector corruption
C) weak authentication
D) buffer overflow
Answer: D
32) Noseybook is a social networking site that boasts over a million registered users and a
quarterly membership growth rate in the double digits. As a consequence, the size of the
information technology department has been growing very rapidly, with many new hires.
Each employee is provided with a name badge with a photo and embedded computer chip
that is used to gain entry to the facility. This is an example of a(n)
A) authentication control.
B) biometric device.
C) remote access control.
D) authorization control.
99
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
33) When new employees are hired by Pacific Technologies, they are assigned user names and
appropriate permissions are entered into the information system's access control matrix. This
is an example of a(n)
A) authentication control.
B) biometric device.
C) remote access control.
D) authorization control.
Answer: D
34) When new employees are hired by Pacific Technologies, they are assigned user names and
passwords and provided with laptop computers that have an integrated fingerprint reader. In
order to log in, the user's fingerprint must be recognized by the reader. This is an example of
a(n)
A) authorization control.
B) biometric device.
C) remote access control.
D) defense in depth.
Answer: B
35) Information technology managers are often in a bind when a new exploit is discovered in
the wild. They can respond by updating the affected software or hardware with new code
provided by the manufacturer, which runs the risk that a flaw in the update will break the
system. Or they can wait until the new code has been extensively tested, but that runs the
risk that they will be compromised by the exploit during the testing period. Dealing with
these issues is referred to as
A) change management.
B) hardening.
C) patch management.
D) defense in depth.
Answer: C
100
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
36) The most effective method for protecting an organization from social engineering attacks
is providing
A) a firewall.
B) stateful packet filtering.
C) a demilitarized zone.
D) employee awareness training.
Answer: D
37) The most effective way to protect network resources that are exposed to the internet, yet
reside outside of a network is
A) a firewall.
B) employee training.
C) a demilitarized zone.
D) stateful packet filtering.
Answer: C
38) All employees of E.C. Hoxy are required to pass through a gate and present their photo
identification cards to the guard before they are admitted. Entry to secure areas, such as the
Information Technology Department offices, requires further procedures. This is an example
of a(n)
A) authentication control.
B) authorization control.
C) physical access control.
D) hardening procedure.
Answer: C
39) On April 1, 2012, students enrolled in an economics course at Harvard University received
an e-mail stating that class would be cancelled. The e-mail claimed to be from the professor,
but it wasn't. Computer forensic experts determined that the e-mail was sent from a
computer in one of the campus labs at 6:32 A.M. They were then able to uniquely identify the
computer that was used by means of its network interface card's ________ address. Security
cameras revealed the identity of the student responsible for spoofing the class.
A) IDS
B) TCP/IP
101
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) MAC
D) DMZ
Answer: C
Answer: B
Answer: C
50) Why does COBIT5 DSS-05.06 stress the importance of restricting physical access to
network printers?
A) because hackers can use them to print out sensitive information
B) because hackers often hide inside large network printers until night
C) because document images are often stored on network printers
D) because network printers are easier to hack into than computers
Answer: C
Answer: A
102
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
103
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
9.1 Identify and explain controls designed to protect the confidentiality of sensitive corporate
information.
1) Identify the type of information below that is least likely to be considered "sensitive" by an
organization.
A) financial statements
B) legal documents
C) strategic plans
D) product cost information
Answer: A
2) Which of the following is not one of the basic actions that an organization must take to
preserve the confidentiality of sensitive information?
A) identification of information to be protected
B) backing up the information
C) controlling access to the information
D) training
Answer: B
Answer: B
104
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: A
Answer: C
8) Identify the first step in protecting the confidentiality of intellectual property below.
A) Identifying who has access to the intellectual property
B) Identifying the means necessary to protect the intellectual property
C) Identifying the weaknesses surrounding the creation of the intellectual property
D) Identifying what controls should be placed around the intellectual property
Answer: A
9) After the information that needs to be protected has been identified, what step should be
completed next?
A) The information needs to be placed in a secure, central area.
B) The information needs to be encrypted.
C) The information needs to be classified in terms of its value to the organization.
D) The information needs to be depreciated.
Answer: C
105
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
10) Which type of software blocks outgoing messages containing key words or phrases
associated with an organization's sensitive data?
A) anti-virus software
B) data loss prevention software
C) a digital watermark
D) information rights software
Answer: B
11) Janus Corporation uses a tool that embeds a code into all of its digital documents. It then
scours the internet, searching for codes that it has embedded into its files. When Janus finds
an embedded code on the internet, it knows that confidential information has been leaked.
Janus then begins identifying how the information was leaked and who was involved with the
leak. Janus is using
A) data loss prevention software.
B) a keylogger.
C) a digital watermark.
D) a spybot.
Answer: C
12) What confidentiality and security risk does using VoIP present to organizations?
A) Internet e-mail communications can be intercepted.
B) Internet photographs can be intercepted.
C) Internet video can be intercepted.
D) Internet voice conversations can be intercepted.
Answer: D
9.2 Identify and explain controls designed to protect the privacy of personal information
collected from customers, employees, suppliers or business partners.
1) Which of the following is not one of the 10 internationally recognized best practices for
protecting the privacy of customers' personal information?
A) Provide free credit report monitoring for customers.
B) Inform customers of the option to opt-out of data collection and use of their personal
information.
106
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: C
3) A client approached Paxton Uffe and said, "Paxton, I need for my customers to make
payments online using credit cards, but I want to make sure that the credit card data isn't
intercepted. What do you suggest?" Paxton responded, "The most effective solution is to
implement
A) a data masking program."
B) a virtual private network."
C) a private cloud environment."
D) an encryption system with digital signatures."
Answer: D
Answer: D
107
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) printed on a report.
D) None of the above
Answer: D
Answer: B
8) Cindy Vindoolo logged on to her e-mail account to find that she had received 50 e-mails
from a company called LifeCo that promised her extreme weight loss if she bought their diet
pills. Cindy angrily deleted all 50 e-mails, realizing she was a victim of
A) telemarketing.
B) spam.
C) direct mail.
D) MLM.
Answer: B
Answer: D
10) Identify the item below that is not a step you could take to prevent yourself from
becoming a victim of identity theft.
A) Shred all documents that contain your personal information.
B) Only print your initial and last name on your personal checks.
108
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
11) Identify the item below which is not a piece of legislation passed to protect individuals
against identity theft or to secure individuals' privacy.
A) the Health Insurance Portability and Accountability Act
B) the Health Information Technology for Economic and Clinical Heath Act
C) the Financial Services Modernization Act
D) the Affordable Care Act
Answer: D
12) If an organization asks you to disclose your social security number, yet fails to permit you
to opt-out before you provide the information, the organization has likely violated which of
the Generally Accepted Privacy Principles?
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Answer: C
13) If an organization asks you to disclose your social security number, but fails to establish a
set of procedures and policies for protecting your privacy, the organization has likely violated
which of the Generally Accepted Privacy Principles?
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Answer: A
14) If an organization asks you to disclose your social security number, but fails to tell you
about its privacy policies and practices, the organization has likely violated which of the
Generally Accepted Privacy Principles?
109
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Answer: B
15) If an organization asks you to disclose your social security number, yet fails to properly
dispose of your private information once it has fulfilled its purpose, the organization has likely
violated which of the Generally Accepted Privacy Principles?
A) Management
B) Notice
C) Choice and consent
D) Use and retention
Answer: D
16) If an organization asks you to disclose your social security number, but decides to use it
for a different purpose than the one stated in the organization's privacy policies, the
organization has likely violated which of the Generally Accepted Privacy Principles?
A) Collection
B) Access
C) Security
D) Quality
Answer: A
17) If an organization asks you to disclose your date of birth and your address, but refuses to
let you review or correct the information you provided, the organization has likely violated
which of the Generally Accepted Privacy Principles?
A) Collection
B) Access
C) Security
D) Choice and consent
Answer: B
110
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
18) If an organization asks you to disclose your date of birth and your address, but fails to take
any steps to protect your private information, the organization has likely violated which of the
Generally Accepted Privacy Principles?
A) Collection
B) Access
C) Security
D) Quality
Answer: C
19) If an organization asks you to disclose your date of birth and your address, but fails to
establish any procedures for responding to customer complaints, the organization has likely
violated which of the Generally Accepted Privacy Principles?
A) Collection
B) Access
C) Security
D) Monitoring and enforcement
Answer: D
9.3 Explain how the two basic types of encryption systems work.
1) Which of the following is not true regarding virtual private networks (VPN)?
A) VPNs provide the functionality of a privately owned network using the Internet.
B) Using VPN software to encrypt information while it is in transit over the Internet in effect
creates private communication channels, often referred to as tunnels, which are accessible only
to those parties possessing the appropriate encryption and decryption keys.
C) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the
corresponding physical connections in a privately owned network.
D) The cost of the VPN software is much less than the cost of leasing or buying the
infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to
create a privately owned secure communications network.
Answer: C
111
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) private keys.
C) public keys.
D) no need for key exchange.
Answer: A
3) The system and processes used to issue and manage asymmetric keys and digital
certificates are known as
A) asymmetric encryption.
B) certificate authority.
C) digital signature.
D) public key infrastructure.
Answer: D
Answer: A
5) Using a combination of symmetric and asymmetric key encryption, Sofia Chiamaka sent a
report to her home office in Bangalore, India. She received an e-mail acknowledgement that
her report had been received, but a few minutes later she received a second e-mail that
contained a different hash total than the one associated with her report. This most likely
explanation for this result is that
A) the public key had been compromised.
B) the private key had been compromised.
C) the symmetric encryption key had been compromised.
D) the asymmetric encryption key had been compromised.
Answer: C
6) Encryption has a remarkably long and varied history. The invention of writing was
apparently soon followed by a desire to conceal messages. One of the earliest methods,
112
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
attributed to an ancient Roman emperor, was the simple substitution of numbers for letters,
for example A = 1,
B = 2, etc. This is an example of
A) a hashing algorithm.
B) symmetric key encryption.
C) asymmetric key encryption.
D) a public key.
Answer: B
7) An electronic document that certifies the identity of the owner of a particular public key.
A) asymmetric encryption
B) digital certificate
C) digital signature
D) public key
Answer: B
8) Which systems use the same key to encrypt communications and to decrypt
communications?
A) asymmetric encryption
B) symmetric encryption
C) hashing encryption
D) public key encryption
Answer: B
Answer: A
113
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
10) Information encrypted with the creator's private key that is used to authenticate the
sender is
A) asymmetric encryption.
B) digital certificate.
C) digital signature.
D) public key.
Answer: C
11) Which of the following is not one of the three important factors determining the strength
of any encryption system?
A) key length
B) key management policies
C) encryption algorithm
D) privacy
Answer: D
12) A process that takes plaintext of any length and transforms it into a short code.
A) asymmetric encryption
B) encryption
C) hashing
D) symmetric encryption
Answer: C
13) Which of the following descriptions is not associated with symmetric encryption?
A) a shared secret key
B) faster encryption
C) lack of authentication
D) separate keys for each communication party
Answer: C
14) Encryption has a remarkably long and varied history. Spies have been using it to convey
secret messages ever since there were secret messages to convey. One powerful method of
encryption uses random digits. Two documents are prepared with the same random sequence
114
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
of numbers. The spy is sent out with one and the spy master retains the other. The digits are
used as follows. Suppose that the word to be encrypted is SPY and the random digits are 352.
Then S becomes V (three letters after S), P becomes U (five letters after P), and Y becomes A
(two letters after Y, restarting at A after Z). The spy would encrypt a message and then destroy
the document used to encrypt it. This is an early example of
A) a hashing algorithm.
B) asymmetric key encryption.
C) symmetric key encryption.
D) public key encryption.
Answer: C
Answer: A
16) In a private key system the sender and the receiver have ________, and in the public key
system they have ________.
A) different keys; the same key
B) a decrypting algorithm; an encrypting algorithm
C) the same key; two separate keys
D) an encrypting algorithm; a decrypting algorithm
Answer: C
17) Asymmetric key encryption combined with the information provided by a certificate
authority allows unique identification of
A) the user of encrypted data.
B) the provider of encrypted data.
C) both the user and the provider of encrypted data.
D) either the user or the provider of encrypted data.
Answer: D
115
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
18) On June 17, 2013, a laptop computer belonging to Thea Technologies was stolen from the
trunk of Jamie Marcia's car while she was attending a conference. After reporting the theft,
Jamie considered the implications for the company's network security and concluded there
was little to worry about because
A) the computer was insured against theft.
B) the computer was protected by a password.
C) the data stored on the computer was encrypted.
D) it was unlikely that the thief would know how to access the company data stored on the
computer.
Answer: C
19) Hjordis Marika took a call from a client. "Hjordis, I need to interact online in real time with
our affiliate in India, and I want to make sure that our communications aren't intercepted.
What do you suggest?" Hjordis responded, "The best solution is to implement
A) a virtual private network."
B) multifactor authentication."
C) a private cloud environment."
D) an asymmetric encryption system with digital signatures."
Answer: A
116
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) The best example of an effective payroll transaction file hash total would most likely be
A) sum of net pay.
B) total number of employees.
C) sum of hours worked.
D) total of employees' social security numbers.
Answer: D
Answer: A
3) Following is the result of batch control totals on employee Social Security numbers in a
payroll processing transaction:
Values
Correct Values Entered
From During
Masterfile Processing
487358796 487358796
534916487 534916487
498374526 498374526
514873420 514873420
534196487 534916487
678487853 678487853
471230589 471230589
3719438158 3720158158
The difference in the control totals is 720,000. Which data entry control would best prevent
similar data entry errors in the future?
A) Modules 11
B) validity check
C) check digit
117
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) sequence check
Answer: C
4) Which of the following data entry controls would not be useful if you are recording the
checkout of library books by members?
A) sequence check
B) prompting
C) validity check
D) concurrent update control
Answer: A
5) A customer failed to include her account number on her check, and the accounts receivable
clerk credited her payment to a different customer with the same last name. Which control
could have been used to most effectively to prevent this error?
A) closed-loop verification
B) duplicate values check
C) validity check
D) reconciliation of a batch control total
Answer: A
6) If invoices are processed in groups of fifty, which fields from the document shown below
would not be used to create a hash control total?
118
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Amount
B) Item Number
C) Quantity Ordered
D) Sales Order number
Answer: A
7) ________ is a data entry input control that involves summing the first four digits of a
customer number to calculate the value of the fifth digit, then comparing the calculated
number to the number entered during data entry.
A) Validity check
B) Duplicate data check
C) Closed-loop verification
D) Check digit verification
Answer: D
8) All of the following controls for online entry of a sales order would be useful except
119
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
9) The inventory tracking system shows that 12 iPods were on hand before a customer brings
three iPods to the register for purchase. The cashier accidentally enters the quantity sold as
30 instead of 3. Which data entry control would most effectively prevent this error?
A) limit check
B) sign check
C) field check
D) validity check
Answer: B
10) A payroll clerk accidently entered an employee's hours worked for the week as 380
instead of 38. The data entry control that would best prevent this error would be
A) a limit check.
B) a check digit.
C) batch total reconciliation.
D) a field check.
Answer: A
11) The data entry control that would best prevent entering an invoice received from a vendor
who is not on an authorized supplier list is
A) a validity check.
B) an authorization check.
C) a check digit.
D) closed-loop verification.
Answer: A
120
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) processing control.
C) input control.
D) data entry control.
Answer: C
Answer: D
Answer: D
Answer: A
Answer: B
121
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: C
Answer: A
Answer: A
122
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) input control.
Answer: D
22) A ________ ensures input data will fit into the assigned field.
A) limit check
B) size check
C) range check
D) validity check
Answer: B
23) This tests a numerical amount to ensure that it does not exceed a predetermined value
nor fall below another predetermined value.
A) completeness check
B) field check
C) limit check
D) range check
Answer: D
24) This determines if all required data items have been entered.
A) completeness check
B) field check
C) limit check
D) range check
Answer: A
25) This determines the correctness of the logical relationship between two data items.
A) range check
B) reasonableness test
C) sign check
D) size check
Answer: B
123
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
27) This tests a numerical amount to ensure that it does not exceed a predetermined value.
A) completeness check
B) limit check
C) range check
D) sign check
Answer: B
28) This batch processing data entry control sums a field that contains dollar values.
A) record count
B) financial total
C) hash total
D) sequence check
Answer: B
29) This batch processing data entry control sums a non-financial numeric field.
A) record count
B) financial total
C) hash total
D) sequence check
Answer: C
30) When I enter a correct customer number, the data entry screen displays the customer
name and address. This is an example of
A) prompting.
B) preformatting.
C) closed-loop verification.
124
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) error checking.
Answer: C
31) This control ensures that the correct and most current files are being updated.
A) cross-footing balance test
B) data matching
C) file labels
D) write-protect mechanism
Answer: C
32) This batch processing data entry control sums the number of items in a batch.
A) financial total
B) hash total
C) record count
D) sequence check
Answer: C
33) This data entry control compares the ID number in transaction data to a master file to
verify that the ID number exists.
A) reasonableness test
B) user review
C) data matching
D) validity check
Answer: D
Answer: C
125
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
35) A computer operator accidentally used the wrong master file when updating a transaction
file. As a result, the master file data is now unreadable. Which control could best have
prevented this from happening?
A) Internal header label
B) validity check
C) check digit
D) parity check
Answer: A
36) Sonja Greer called the IT Help Desk in a bad mood. "I'm trying to open an Excel file, but I
get a message that says that the file is locked for editing. Why is this happening to me?" The
answer is likely that
A) the file is corrupted due to a computer virus.
B) Sonja probably opened the file as read-only.
C) concurrent update controls have locked the file.
D) there is no problem. Sonja is editing the file, so it is locked.
Answer: C
37) This control protects records from errors that occur when two or more users attempt to
update the same record simultaneously.
A) concurrent update controls
B) cross-footing balance test
C) data conversion controls
D) recalculation of batch totals
Answer: A
38) Modest Expectations Investment Services (MEIS) allows customers to manage their
investments over the Internet. If customers attempt to sell more shares of a stock than they
have in their account, an error message is displayed. This is an example of a
A) reasonableness test.
B) field check.
C) validity check.
D) limit check.
126
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
39) Modest Expectations Investment Services (MEIS) allows customers to manage their
investments over the Internet. If customers attempt to spend more money than they have in
their account, an error message is displayed. This is an example of a
A) reasonableness test.
B) field check.
C) validity check.
D) limit check.
Answer: A
40) The Spontaneous Combustion Rocket Shoppe in downtown Fargo, North Dakota,
generates three quarters of its revenue from orders taken over the Internet. The revenue
clearing account is debited by the total of cash and credit receipts and credited by the total of
storefront and Internet sales. This is an example of a
A) data integrity test.
B) zero-balance test.
C) trial balance audit.
D) cross-footing balance test.
Answer: B
41) This control entails verifying that the proper number of bits are set to the value 1 in each
character received.
A) echo check
B) field check
C) parity check
D) trailer record
Answer: C
42) Which of the following is not a risk associated with the data input process?
A) Data is invalid.
B) Data is incomplete.
C) Data is inaccurate.
D) Data is corrupted.
127
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: B
44) Which of the following is a control is an important way to prevent buffer overflow
vulnerabilities?
A) limit check
B) size check
C) range check
D) field check
Answer: B
Answer: C
Answer: B
128
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: B
Answer: C
5) A facility that contains all the computing equipment the organization needs to perform its
essential business activities is known as a
A) cold site.
B) hot site.
C) remote site.
D) subsidiary location.
Answer: B
6) A facility that is pre-wired for necessary telecommunications and computer equipment, but
doesn't have equipment installed, is known as a
129
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) cold site.
B) hot site.
C) remote site.
D) subsidiary location.
Answer: A
7) When a computer system's files are automatically duplicated on a second data storage
system as they are changed, the process is referred to as
A) real-time mirroring.
B) batch updating.
C) consistency control.
D) double-secure storage.
Answer: A
Answer: B
Answer: A
10) While this type of backup process takes longer than the alternative, restoration is easier
and faster.
A) archive
130
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) cloud computing
C) differential backup
D) incremental backup
Answer: C
11) ________ involves copying only the data items that have changed since the last partial
backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup
Answer: D
12) ________ copies all changes made since the last full backup.
A) Archive
B) Cloud computing
C) Differential backup
D) Incremental backup
Answer: C
Answer: B
14) The maximum acceptable down time after a computer system failure is determined by a
company's
A) recovery time objective.
B) recovery point objective.
C) recovery objective.
D) maximum time recovery objective.
131
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: D
16) The accounting department at Aglaya Telecom records an average of 5,000 transactions
per hour. A cost-benefit analysis leads management to conclude that the maximum
acceptable amount of data loss is 20,000 transactions. If the firm's recovery time objective is
60 minutes, then the worst case recovery time objective is
A) 1 hour.
B) 2 hours.
C) 3 hours.
D) 4 hours.
Answer: D
17) The accounting department at Aglaya Telecom records an average of 5,000 transactions
per hour. By cost-benefit analysis, managers have concluded that the maximum acceptable
loss of data in the event of a system failure is 50,000 transactions. The firm's recovery point
objective is therefore
A) 50,000 transactions.
B) 5,000 transactions.
C) 10 hours.
D) 4 hours.
Answer: C
132
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
18) The accounting department at Aglaya Telecom records an average of 2,500 transactions
per hour. Managers state that the maximum acceptable loss of data in the event of a system
failure is 2,500 transactions. The firm's recovery point objective is therefore
A) 2,500 transactions.
B) 5,000 transactions.
C) 1 hour.
D) 2 hours.
Answer: C
Answer: D
Answer: A
23) What is the primary objective of ensuring systems and information are available for use
whenever needed?
A) to minimize system downtime
B) to minimize system expense
C) to maximize system processing speed
D) to maximize sales
Answer: A
133
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
25) With regards to systems availability, deploying and using multiple components provides
an AIS with
A) fault tolerance.
B) cost savings.
C) enhanced processing speed.
D) maximum sales.
Answer: A
26) Which of the following is not a common design feature of housing mission-critical servers
and databases?
A) adequate air-conditioning systems to reduce the likelihood of damage due to overheating
B) overhead sprinklers to provide protection from fire
C) cables with special plugs that cannot be easily removed
D) surge-protection devices to provide protection against temporary power fluctuations
Answer: B
27) To protect against malware, it is important that antivirus software automatically examine
________ introduced into a system.
A) CDs
B) e-mail
C) flash drives
D) all of the above
Answer: D
28) Which of the following is a key control regarding the minimization of system downtime?
A) fault tolerance
B) disaster recovery plans
C) backup procedures
D) all of the above
Answer: A
134
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) DSS04.07
C) DSS03.05
D) DSS04.04
Answer: B
30) Whose responsibility is it to determine the amount of time an organization can afford to
be without its information system?
A) the board of directors
B) senior management
C) external auditors
D) COBIT
Answer: B
31) Is it best practice for an organization to practice periodically restoring a system from its
backup files?
A) No, doing so might introduce errors into the system's data.
B) No, doing so takes the system offline and prevents customers from being able to access the
system.
C) Yes, doing so verifies the procedure and backup media are working correctly.
D) Yes, doing so improves the efficiency of the system.
Answer: C
Answer: C
34) Loreen Tina is the chief lawyer for Tamara Incorporated. The CEO of Tamara Incorporated
asks Loreen whether the company should periodically delete all company e-mail. If Loreen is
well-versed in AIS best practices, she would mostly likely respond,
135
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Yes, if we are ever sued, the other attorney will not be able to comb through our e-mail for
evidence.
B) Yes, since e-mail requires a lot of storage space, deleting it periodically will reduce the
amount of information we need to store.
C) No, deleting an organization's e-mail is against the law.
D) No, if we are ever sued we will not be able to draw upon our e-mail records to defend
ourselves.
Answer: D
35) Identify the most important component of a disaster recovery plan below.
A) documentation
B) operating instructions
C) periodic testing
D) on-site and off-site storage
Answer: C
36) Identify one organization that quickly recovered from September 11th, 2001 due to its
disaster recovery and business continuity plan.
A) New York Stock Exchange
B) NASDAQ
C) New York Fire Department
D) United Airlines
Answer: C
136
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
3.1 Prepare and use data flow diagrams to understand, evaluate, and document information
systems.
Answer: A
2) All of the following are guidelines for preparing data flow diagrams except
A) show the most detail in the highest-level DFD.
B) include all storage files, even if they are only temporary.
C) uniquely name all data flows.
D) sequentially number process bubbles.
Answer: A
Answer: B
Answer: D
137
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
documentation tools.
D) Data flow diagrams and flowcharts are difficult to prepare and revise using software
packages.
Answer: D
Answer: A
Answer: D
8) In preparing a DFD, when data are transformed through a process, the symbol used should
be
A) a circle.
B) an arrow.
C) a square.
D) two horizontal lines.
Answer: A
Answer: B
138
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
10) In a data flow diagram of the customer payment process, "update receivables" will appear
above or in
A) a square.
B) a circle.
C) two horizontal lines.
D) none of the above
Answer: B
11) In a data flow diagram of the customer payment process, "Customer" will appear above or
in
A) a square.
B) a circle.
C) two horizontal lines.
D) none of the above
Answer: A
12) In a data flow diagram of the customer payment process, "Customer payment" will
appear above or in
A) a square.
B) a circle.
C) two horizontal lines.
D) an arrow.
Answer: D
Answer: C
139
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: D
16) In a payroll processing DFD, the "prepare reports" activity will be represented by
________, the "employee payroll file" will be represented by ________, and the
"management" will be represented by ________.
A) a circle; two horizontal lines; a square
B) a circle; two horizontal lines; two horizontal lines
C) a rectangle; a square; a circle
D) a square; two horizontal lines; a circle
Answer: A
17) The American Bread Company is a small restaurant that collects, stores, prepares and
provides meals to customers in Miami, Florida. When food is received, it is recorded in a
database and a receiving ticket is provided to the vendor. When food is used, the database is
updated so that it always reflects the amount and type of food available to customers. In a
data flow diagram, which type of symbol would be used to represent vendors?
A)
B)
C)
D)
Answer: A
18) The American Bread Company is a small restaurant that collects, stores, prepares and
provides meals to customers in Miami, Florida. When food is received, it is recorded in a
database and a receiving ticket is provided to the vendor. When food is used, the database is
140
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
updated so that it always reflects the amount and type of food available to customers. In a
data flow diagram, which type of symbol would be used to represent the system processing
food received from the vendor?
A)
B)
C)
D)
Answer: B
19) The American Bread Company is a small restaurant that collects, stores, prepares and
provides meals to customers in Miami, Florida. When food is received, it is recorded in a
database and a receiving ticket is provided to the vendor. When food is used, the database is
updated so that it always reflects the amount and type of food available to customers. In a
data flow diagram, which type of symbol would be used to represent the storage location of
data in the system?
A)
B)
C)
D)
Answer: D
20) The American Bread Company is a small restaurant that collects, stores, prepares and
provides meals to customers in Miami, Florida. When food is received, it is recorded in a
database and a receiving ticket is provided to the vendor. When food is used, the database is
updated so that it always reflects the amount and type of food available to customers. In a
141
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
data flow diagram, which type of symbol would be used to represent the process of updating
the company's inventory records in the system?
A)
B)
C)
D)
Answer: B
21) The American Bread Company is a small restaurant that collects, stores, prepares and
provides meals to customers in Miami, Florida. When food is received, it is recorded in a
database and a receiving ticket is provided to the vendor. When food is used, the database is
updated so that it always reflects the amount and type of food available to customers. In a
data flow diagram, which type of symbol would be used to represent the flow of data
provided by the vendors into the system?
A)
B)
C)
D)
Answer: C
142
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
22) Terrell and Monique Anderson run an antique store in their hometown of Dayton, Ohio.
To find items to sell in their shop, they travel around the United States and Europe buying
unique artifacts. Within an hour of making a purchase, they use their smartphone to take a
picture of the item and post a short tweet about the item on Twitter. Then, they ship the item
back to Dayton for sale in their shop. Which symbol should be used to represent Twitter in a
context diagram of this process?
A)
B)
C)
D)
Answer: A
23) Terrell and Monique Anderson run an antique store in their hometown of Dayton, Ohio.
To find items to sell in their shop, they travel around the United States and Europe buying
unique artifacts. Within an hour of making a purchase, they use their smartphone to take a
picture of the item and post a short tweet about the item on Twitter. Which symbol should
be used to represent the preparation of data for their tweet in a context diagram of this
process?
A)
B)
C)
D)
Answer: B
24) Terrell and Monique Anderson run an antique store in their hometown of Dayton, Ohio.
143
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
To find items to sell in their shop, they travel around the United States and Europe buying
unique artifacts. Within an hour of making a purchase, they use their smartphone to take a
picture of the item and post a short tweet about the item on Twitter. Which symbol should be
used to represent the transfer of data to Twitter in a context diagram of this process?
A)
B)
C)
D)
Answer: C
25) Terrell and Monique Anderson run an antique store in their hometown of Dayton, Ohio.
To find items to sell in their shop, they travel around the United States and Europe buying
unique artifacts. Within an hour of making a purchase, they use their smartphone to take a
picture of the item and post a short tweet about the item on Twitter. Which symbol should be
used to represent the remote server that stores the tweets (i.e., the Twitter posts) data?
A)
B)
C)
D)
Answer: D
26) Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor.
He has been asked to document the existing accounting information system, and focus on the
activities and flow of data between activities. He decides to begin with a summary description
of the sources and uses of data in the organization and how they are processed by the system.
144
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
27) A well-planned and drawn level 0 data flow diagram for the expenditure cycle would show
which of the following processes?
A) 1.0 Order Goods; 2.0 Receive and Store Goods; 3.0 Pay for Goods
B) 1.0 Order Goods; 1.1 Receive and Store Goods; 1.2 Pay for Goods
C) 0.1 Order Goods; 0.2 Receive and Store Goods; 0.3 Pay for Goods
D) 0.1 Order Goods; 0.12 Receive and Store Goods; 0.13 Pay for Goods
Answer: A
28) A well-planned and drawn context data flow diagram will include how many processes?
A) one
B) between 5 and 7
C) between 2 and 7, but no more than 7
D) as many as are needed to accurately depict the process being documented
Answer: A
Answer: A
145
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
30) Which is the correct label for the blank transformation process circle in the data flow
diagram below?
Answer: A
146
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) data store.
B) data source.
C) data flow.
D) data source and destination.
Answer: A
147
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) data store.
B) data flow.
C) data source.
D) data destination.
Answer: D
148
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
45) In the data flow diagram below, which process happens first?
Answer: B
47) In a data flow diagram of the vendor payment process, what symbol would most
appropriately reflect an update of the payables account?
A) a square
B) a circle
C) two horizontal lines
D) none of the above
Answer: B
149
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
48) In a data flow diagram of the vendor payment process, "Vendor" will appear above or in
A) a square.
B) a circle.
C) two horizontal lines.
D) none of the above
Answer: A
Answer: A
50) In a data flow diagram that depicts a company's internal controls, where is each internal
control typically explained in detail?
A) in an annotation on the same page as the internal control
B) inside the symbol used to represent the internal control
C) on a table that accompanies the internal control data flow diagram
D) Internal controls are not typically explained in detail in an internal control data flow diagram.
Answer: C
51) Which documentation technique would not depict the type of storage medium used (such
as a flash drive or a hard drive) to physically store data?
A) system flowchart
B) data flow diagram
C) business process diagram
D) internal control flowchart
Answer: B
52) In a data flow diagram of the order shipping process, what symbol would most
appropriately denote a "Bill of Lading" used in the process?
A) a square
B) a circle
C) two horizontal lines
D) an arrow
Answer: D
150
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
3.2 Prepare and use flow diagrams to understand, evaluate, and document information
systems.
A) Purchase Order 3
B) Purchase Requisition 1
C) Accounts Payable Trial Balance
D) Purchase Order 2
Answer: D
151
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) 1
B) Purchase Requisition 1
C) Receiving Report 1
D) 2
Answer: A
152
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Purchase Order 1.
B) Purchase Requisition 1.
C) Receiving Report 1.
D) 4.
Answer: B
153
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
4) The correct shape for the triangle labeled "Supplier" in the flowchart below should be a
A) magnetic disk.
B) terminal.
C) manual process.
D) off-page connector.
Answer: B
154
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
6) Flowchart symbols
A) are divided into four categories.
B) are unique to the organization creating the flowchart.
C) are normally drawn using a flowcharting template.
D) eliminate the need for narrative descriptions or explanations.
Answer: A
7) Which is a true statement regarding the use of the manual processing symbol in a
flowchart?
A) If a document is moved from one column to another, show the document only in the last
column.
B) Each manual processing symbol should have an input and an output.
C) Do not connect two documents when moving from one column to another.
D) Use a manual processing symbol to indicate a document being filed.
Answer: B
Answer: B
155
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Use the chart below to answer the following questions regarding flow chart symbols.
Answer: C
Answer: A
11) Which symbol would be used in a flowchart to represent an invoice sent to a customer?
A) #2
B) #6
C) #1
D) #15
Answer: C
156
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) #3
D) #5
Answer: A
Answer: B
14) Which symbol would be used in a flowchart to represent a connection to another part of
the flowchart on the same page?
A) #4
B) #13
C) #14
D) #15
Answer: C
15) Which symbol would be used in a flowchart to represent a connection to another part of
the flowchart on a different page?
A) #4
B) #13
C) #14
D) #15
Answer: D
16) Which symbol would be used in a flowchart to represent a file of paper documents?
A) #7
B) #8
C) #9
D) #15
Answer: C
17) Which symbol would be used in a flowchart to represent a general ledger master file kept
on magnetic disk?
A) #2
157
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) #5
C) #7
D) #8
Answer: C
18) Which symbol would be used in a flowchart to represent employee time cards sent by
department managers to the payroll department?
A) #1
B) #4
C) #11
D) #16
Answer: A
19) Which symbol would be used in a flowchart to represent the display of a report on a
computer screen?
A) #1
B) #2
C) #3
D) #11
Answer: C
20) Which symbol would be used in a flowchart to represent the addition of information
about a step represented in another symbol on the flowchart?
A) #1
B) #5
C) #11
D) #15
Answer: C
21) Which symbol would be used in a flowchart to represent a payroll master file kept on
magnetic tape?
A) #4
B) #7
C) #8
D) #9
Answer: C
158
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
23) Which symbol would be used in a flowchart to represent a flow of data or documents?
A) #12
B) #13
C) #14
D) #15
Answer: A
Answer: B
25) In a document flowchart of a manual payroll processing system, "update customer file"
will be shown by a(n) ________ symbol, and "prepare vendor check" will be shown by a(n)
________ symbol.
A) input; output
B) input; manual operation
C) manual operation; output
D) manual operation; manual operation
Answer: D
26) A flowchart that depicts the relationships among the input, processing, and output of an
AIS is
A) an internal control flowchart.
B) a document flowchart.
C) a system flowchart.
D) a program flowchart.
159
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: D
28) Nishant Kumar has been hired by American Manufacturing as a staff accountant in the
internal audit department. He has been asked to thoroughly document the existing
accounting information system in preparation for making recommendations for
improvements to internal controls. He decides to begin with a description of the information
stored in paper records, their sources, and their destinations. The documentation tool that he
should employ for this purpose is a
A) data flow diagram.
B) document flowchart.
C) system flowchart.
D) program flowchart.
Answer: B
29) Nishant Kumar has been hired by American Manufacturing as a staff accountant in the
internal audit department. He has been asked to thoroughly document the existing
accounting information system in preparation for making recommendations for
improvements. He decides to begin by meeting with the information technology staff in order
to develop an understanding of the computer programs used by the system. The
documentation tool that he should employ for this purpose is a
A) data flow diagram.
B) document flowchart.
C) system flowchart.
D) program flowchart.
Answer: D
30) Nishant Kumar has been hired by American Manufacturing as a staff accountant in the
internal audit department. He has been asked to thoroughly document the existing
accounting information system in preparation for making recommendations for
improvements. He decides to begin by meeting with the information technology staff in order
to develop an understanding of the overall operation of the AIS, including data entry, storage,
and output. The documentation tool that he should employ for this purpose is a
160
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
31) A materials requisition order document is prepared from the inventory file and the
materials file, both of which are stored on a hard drive. Which one of the following diagrams
represents this activity?
A)
B)
C)
D)
161
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
32) A customer's check is returned for insufficient funds and the accounts receivable file,
stored on a hard drive, is updated. Which one of the following diagrams represents this
activity?
A)
B)
C)
D)
Answer: C
33) A business simulation game that is used by colleges and universities all over the world has
students submit decisions over the Internet. Decisions are stored online, processed on the
server, and then the results are stored online. They are then downloaded by students in
preparation for the next round. Which one of the following diagrams represents this activity?
A)
B)
C)
162
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D)
Answer: C
34) A report is generated from data stored on a hard drive. Which one of the following
diagrams represents this activity?
A)
B)
C)
D)
Answer: C
35) An employee receives a paycheck prepared in the payroll process. Which one of the
following diagrams represents this activity?
A)
B)
C)
D)
163
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
36) A student manually prepares a homework assignment and then turns it in to her teacher.
Which one of the following diagrams represents this activity?
A)
B)
C)
D)
Answer: A
Answer: A
164
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Use the chart below to answer the following questions regarding flow chart symbols.
41) Which symbol would be used in a flowchart to represent the symbol for a file?
A) #9
B) #5
C) #6
D) #11
Answer: A
42) Which symbol would be used in a flowchart to represent manually prepared control
totals?
A) #9
B) #8
C) #4
D) #7
Answer: C
43) Which symbol would be used in a flowchart to represent a customer sales order?
A) #2
B) #1
C) #5
D) #15
Answer: B
44) Which symbol would be used in a flowchart to note that every sales order contains the
customer name, address, product number, quantity ordered, item cost, and credit terms?
165
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) #5
B) #8
C) #11
D) #16
Answer: C
45) Which symbol would be used in a flowchart to indicate a wireless connection between a
laptop and the mainframe?
A) #13
B) #12
C) #11
D) #14
Answer: A
46) Which symbol would be used in a flowchart to indicate flight information was displayed to
customers via a large electronic screen in the airport terminal?
A) #1
B) #2
C) #3
D) #4
Answer: C
47) Which symbol would be used in a flowchart to indicate the process started with the
Human Resources department?
A) #1
B) #10
C) #12
D) #16
Answer: D
48) Carly Jackson is a staff auditor for KPMG. She has been asked to document the client's
existing accounting information system so the engagement team can assess the client's
adequacy of controls around financial reporting. She decides to begin by creating a flowchart
to describe, analyze, and evaluate internal controls. What documentation tool should she use
for this purpose?
A) internal control flowchart
B) document flowchart
C) system flowchart
166
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) dataflow diagram
Answer: A
49) Carly Jackson is a staff auditor for KPMG. She has been asked to document the client's
existing accounting information system so the engagement team can assess the client's
adequacy of controls around financial reporting. She decides to begin by examining the
client's key software applications, examining a flowchart that illustrates the sequence of
logical operations performed by the system in executing the application. To do this, Carly
should ask the client for what type of flowchart?
A) internal control flowchart
B) document flowchart
C) system flowchart
D) program flowchart
Answer: D
50) To create a good business process flowchart, one should emphasize ________ and put less
emphasis on ________.
A) meeting with top management; meeting with staff employees
B) following rigid rules on how to prepare a business process flowchart; clearly communicating
the activities involved in the process
C) clearly communicating the activities involved in the process; following rigid rules on how to
prepare a business process flowchart
D) meeting with staff employees; meeting with top management
Answer: C
167
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
12.1 Describe the basic business activities and related information processing operations
performed in the revenue cycle.
1) Basic segregation of duties requires the credit manager reports to the ________ and the
treasurer report to the ________.
A) treasurer; controller
B) treasurer; vice president of finance
C) controller; vice president of finance
D) marketing manager; vice president of finance
Answer: B
2) The ________ normally triggers the billing process in the revenue cycle.
A) sales order received from the sales department
B) picking ticket received from the sales department
C) packing slip received from the shipping department
D) journal voucher received from the shipping department
Answer: C
Answer: C
Answer: B
168
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: C
7) When a customer places an order (on account) for a certain product, what should be done
before the order is checked for inventory availability?
A) The customer's available credit should be checked.
B) The sales order should be created and written to a file.
C) Shipping should be notified of an order in process.
D) A picking list should be generated for the warehouse.
Answer: A
8) How is credit approval generally handled for established customers with a documented
payment history?
A) A new credit application is requested.
B) General authorization by a sales clerk
C) Specific authorization by the credit manager
D) A formal credit check should be made for each sale.
Answer: B
9) What is a typical procedure for processing sales orders from new customers or customers
making a purchase that causes their credit limit to be exceeded?
A) General authorization to approve the order is given to sales clerks.
B) Specific authorization must be granted by the credit manager.
C) The sale should be rejected.
D) The sales clerk should order a report from a credit bureau before approving the order.
Answer: B
10) Checking the quantity of inventory available before accepting a sales order is a good
practice for all of the reasons except to
A) determine which items may need to be back ordered.
169
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
11) Special software packages called ________ can help an organization manage customer
service.
A) EDI systems
B) CRM systems
C) POS systems
D) VMI systems
Answer: B
12) The ________ is a legal contract that defines responsibility for goods that are in transit.
A) bill of lading
B) packing slip
C) back order
D) picking list
Answer: A
13) Two documents usually accompany goods shipped to a customer. What are the two
documents?
A) a bill of lading and an invoice
B) a packing slip and a bill of lading
C) an invoice and a packing slip
D) an invoice and a sales order
Answer: B
14) The basic document created in the billing process is call a ________.
A) bill of lading
B) sales invoice
C) sales order
D) packing list
Answer: B
15) A company uses the method for tracking accounts receivable where customers pay
according to individual sales invoices. This describes the ________ method.
170
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) monthly statement
B) open-invoice
C) balance forward
D) cycle billing
Answer: B
16) A method for tracking accounts receivable that matches specific invoices and payments
from the customer is called a(n) ________ method.
A) specific identification
B) balance forward
C) cycle billing
D) open-invoice
Answer: D
17) The document a customer returns with their payment and that identifies the source and
the amount of the payment is called a
A) remittance advice.
B) remittance list.
C) credit memorandum.
D) debit memorandum.
Answer: A
18) In the ________ method of tracking accounts receivable, customers pay according to the
amount showing on their monthly statement and payments are applied against the total
account balance.
A) specific identification
B) open-invoice
C) balance forward
D) remittance advice
Answer: C
19) When a customer pays off the balance on an invoice, the payment is credited to the
________ file.
A) customer master
B) sales transaction
C) cash receipts master
D) All of the above are correct.
171
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
20) A type of business document in which part of the original document is returned to the
source for further processing is called a ________ document.
A) feedback
B) returnable
C) closed-loop
D) turnaround
Answer: D
21) A document typically encountered in the revenue cycle that is both an output document
and a source document is the
A) sales invoice.
B) customer purchase order.
C) sales order.
D) packing slip.
Answer: A
22) A(n) ________ system prepares and mails monthly statements to customers throughout
the entire month, instead of just at the end of the month.
A) continuous
B) open-invoice
C) cycle billing
D) balance forward
Answer: C
23) The activities involved in soliciting and processing customer orders within the revenue
cycle are known as the
A) sales order entry process.
B) shipping order process.
C) revenue process.
D) marketing process.
Answer: A
24) Laz Chance wears roller blades and headphones when he is at work at the Squishy Things
Toy Company. He is a product packer. The headphones give him computer-generated
instructions so he knows the location of each item and quantity that should be included in the
order. These instructions are the equivalent of a
172
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) picking ticket.
B) bill of lading.
C) packing slip.
D) sales order.
Answer: A
25) The shipping department at Eka Toys follows policies that determine which carrier will
deliver orders according to the size, weight, and destination of the shipment. It maintains
standing agreements with shippers that specify legal responsibility for the shipment while it is
in transit. The terms of the shipping agreements are documented on
A) picking tickets.
B) packing slips.
C) bills of lading.
D) RFID tags.
Answer: C
26) The accounts receivable management method typically used by credit card companies is
A) balance forward.
B) postbilling.
C) monthly statement.
D) open-invoice.
Answer: A
34) If a firm does not use an ERP, the best way to mitigate the risk of the destruction of master
data is to
A) implement backup and disaster recovery procedures.
B) use an ERP.
C) proper segregation of duties.
D) use of multiple master data files.
Answer: A
35) If a firm uses an ERP, the best way to mitigate the risk of the destruction of master data is
to
A) frequently update the ERP system.
B) implement the ERP system in three separate instances.
C) periodically audit the ERP system.
D) integrate the ERP system with all IT functions.
173
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: B
37) An accounts receivable aging report is useful for doing everything except
A) estimating bad debts.
B) estimating future sales.
C) projecting the timing of future cash flows.
D) deciding whether to increase a specific customer's credit limit.
Answer: B
38) It costs ________ times as much to acquire a new customer as it does to make a sale to an
existing customer.
A) two
B) five
C) eight
D) ten
Answer: B
39) Research suggests which of the following is key to improving total customer satisfaction?
A) price of product
B) speed of shipping
C) quality and nature of customer contact after the sale
D) quality and nature of customer contact before the sale
Answer: C
Answer: B
174
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: C
12.2 Discuss the key decisions that need to be made in the revenue cycle, and identify the
information needed to make those decisions.
1) Which of the decisions below is not ordinarily found as part of the revenue cycle?
A) What credit terms should be offered?
B) How often should accounts receivable be subjected to audit?
C) How can customer payments be processed to maximize cash flows?
D) What are the optimal prices for each product or service?
Answer: B
2) Key differences exist when an integrated Enterprise Resource Planning system (ERP)
replaces an existing AIS or legacy system. For example, ________ are more accurate and
timely, enabling sales order entry staff to provide customers more accurate information about
delivery dates.
A) inventory records
B) cash receipts
C) credit approval decisions
D) exception reports
Answer: A
3) Which of the following is not a key decision that needs to be made in the revenue cycle?
A) How should merchandise be delivered to customers?
B) Should credit be extended to customers?
175
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
4) Regularly reviewing an accounts receivable aging report can help management do what?
A) spot firms who are falling behind in their payments
B) identify customers who have not purchased anything lately
C) improve the speed which customers make payments
D) determine whether the firm's pricing policy is effective
Answer: A
5) Regularly reviewing an accounts receivable aging report can help management do what?
A) identify customers who have not purchased anything lately
B) determine whether changes are needed in the firm's credit policies
C) improve the speed which customers make payments
D) determine whether the firm's pricing policy is effective
Answer: B
6) By using an ERP to merge the billing, sales, and marketing functions, the firm may be able
to
A) bill the customer right after the sale occurs.
B) market products and services on bills sent to customers.
C) use customer's past purchase history to send information about related products and
services the customer may be interested in.
D) eliminate the need for a firm to have a billing, sales, and marketing department.
Answer: C
Answer: A
12.3 Identify major threats in the revenue cycle, and evaluate the adequacy of various control
procedures for dealing with those threats.
176
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) Before a shipping notice is prepared during the revenue cycle, shipping department
personnel should match the inventory received from the warehouse to the
A) sales order.
B) picking tickets.
C) picking ticket and sales order.
D) sales order and bill of lading.
Answer: C
2) Which is the best control to prevent invoicing customers for more than the actual quantity
shipped?
A) Use the information from the sales order to prepare the sales invoice.
B) Use the information from the packing slip to prepare the sales invoice.
C) Use the information from the bill of lading to prepare the sales invoice.
D) Use the information from the picking ticket to prepare the sales invoice.
Answer: B
3) The cashier deposits checks for Benedek Incorporated and also prepares payments to
vendors. Of the following, who is best able to reconcile the bank statement to Benedek's
records on a regular basis?
A) cashier
B) internal audit department
C) treasurer
D) external auditor
Answer: B
Answer: A
5) Which of the following is not one of the controls when customer payments are commingled
with other mail?
A) preparing a remittance list as mail is opened
B) restrictively endorsing checks when received
177
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
6) Matching customer account numbers and inventory item numbers to the numbers in the
customer and inventory master files is an example of a
A) completeness test.
B) field check.
C) reasonableness test.
D) validity check.
Answer: D
7) During the sales order entry process, a ________ is performed to compare the quantity
ordered with the standard amounts normally ordered.
A) completeness test
B) redundant data check
C) field check
D) reasonableness test
Answer: D
8) During the sales order entry process, a ________ is performed to verify that each
transaction record contains all appropriate data items.
A) completeness test
B) redundant data check
C) field check
D) reasonableness test
Answer: A
9) The best solution for maintaining accurate automated perpetual inventory system is to use
A) closed-loop verification when inventory is received from vendors and recorded.
B) point of sale devices integrated with inventory records.
C) periodic physical counts to reconcile with perpetual inventory records.
D) RFID tags.
Answer: D
10) Segregation of duties controls dictates that the collection and recording functions be kept
separate from each other. However, the accounts receivable department needs to know when
178
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
customers pay their invoices. What is a solution to this potential internal control problem?
A) Establish a lockbox arrangement with a bank.
B) Have customers send a remittance advice with their payment.
C) Have mailroom personnel prepare a remittance list which can be forwarded to accounts
receivable.
D) all of the above
Answer: D
11) The benefits of a lockbox arrangement with a bank are maximized when
A) the bank is located nearby to the company, so remittance advices can be delivered to the
company every day.
B) several banks around the country are used, in order to minimize the time payments spend in
the mail.
C) an arrangement is made with only one bank, so all remittance advices can be batched for
processing.
D) the bank deposits the payments and accesses the customer's information system to record
the payments.
Answer: B
12) An ________ is an arrangement where a bank receives customer payments and transmits
payment data to the organization.
A) e-commerce.
B) electronic funds transfer (EFT).
C) electronic lockbox.
D) electronic data interchange (EDI).
Answer: C
13) Customers that send their payments electronically directly to the billing company's bank
are using
A) electronic funds transfer (EFT).
B) electronic data interchange (EDI).
C) procurement cards.
D) an electronic lockbox.
Answer: A
14) A way to incorporate the advantages of Electronic Data Interchange with the Electronic
Funds Transfer is
A) Financial Electronic Data Interchange.
179
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) e-commerce.
C) to use procurement cards.
D) an electronic lockbox.
Answer: A
15) To ensure proper segregation of duties, only the ________ has authority to issue credit
memos.
A) accounts receivable supervisor
B) controller
C) credit manager
D) cashier
Answer: C
16) It has been discovered that credit sales have been made to customers with a poor credit
rating. If this continues, the company will face increasing uncollectible receivables and losses
due to bad debts. Separation of duties between ________ and ________ should help resolve
the problem.
A) shipping; billing duties
B) credit approval; marketing
C) billing; credit approval
D) marketing; accounts receivable
Answer: B
17) Consider the following revenue cycle scenario: The company has been exposed to
customer dissatisfaction and the suggested control procedure to be implemented is to install
and use bar-code scanners. What is the threat?
A) The company may be shipping the wrong merchandise.
B) The company may be shipping the wrong quantities of merchandise.
C) The company may be shipping orders to the wrong address.
D) All of the above threats may apply to this scenario.
Answer: A
18) Separating the shipping and billing functions is designed to reduce the threat of
A) failure to bill customers.
B) billing customers for wrong quantities.
C) billing customers before merchandise has been shipped.
D) shipping the wrong merchandise.
180
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
19) All of the following edit checks for online editing of accounts receivable transactions
would probably be included except
A) validity checks on customer ID and invoice numbers.
B) check digit verification on the amount of the sale.
C) closed loop verification on the customer ID.
D) field checks on the values in dollar fields.
Answer: B
20) When a proper segregation of duties exists in the area of handling cash receipts, the
________, who reports to the ________, actually handles the cash and is not the same person
who posts cash receipts to customer accounts.
A) cashier; treasurer
B) cashier; controller
C) accountant; treasurer
D) accountant; controller
Answer: A
21) In a revenue cycle with proper controls, the ________ who reports to the ________, is not
involved in any cash handling activities.
A) accounts receivable clerk; treasurer
B) accounts receivable clerk; controller
C) cashier; controller
D) cashier; treasurer
Answer: B
22) A serious exposure in the revenue cycle is loss of assets. What is the related threat and
applicable control procedure that address this exposure?
A) shipping errors; reconciliation of sales order with picking ticket and packing slip
B) theft of cash; segregation of duties and minimization of cash handling
C) making sales that turn out to be uncollectible; force sales people to make collection calls on
customers with past due balances
D) poor performance; preparation and review of performance reports
Answer: B
23) Which of the following duties could be performed by the same individual and not violate
segregation of duty controls?
181
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
24) Internal file labels can be used to prevent the loss of data in the revenue cycle since they
A) record off-site storage locations.
B) keep competitors from accessing files.
C) organize the on-site physical storage site.
D) reduce the possibility of erasing important files.
Answer: D
25) The manager of Callow Youth Clothing was entering an order online from Sad Clown
Pajamas. He ordered 100 one-size fits all pajama bottoms, but when he ordered 1000 one-size
fits all pajama tops, the following error message popped up: "Did you mean to enter a
quantity of 1000 for your order?" This message is the result of a
A) reasonableness test.
B) validity check.
C) limit check.
D) closed-loop verification.
Answer: A
26) The manager of Cezary Foods was purchasing inventory from Bogumil Distributors online.
The manager entered the items and quantities, completed the checkout and payment
process, but received the following error message before the order could be processed:
"Please enter your phone number." This message is likely the result of a
A) validity check.
B) completeness test.
C) closed-loop verification.
D) customer relationship management software application.
Answer: B
27) Bogumil Distributors is an Internet-based wholesaler. Customers enter their orders online.
The manager of Cezary Foods was entering an order when the following error message
popped up: "Your order exceeds your available credit. You will be contacted within 8 hours."
This message is the result of a
A) sign check.
182
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) validity check.
C) reasonableness test.
D) limit check.
Answer: D
28) Because it is the most fungible of all assets, the management of cash has always been the
most difficult of all control issues. The most important of cash controls is
A) minimization of cash handling.
B) lockbox arrangements.
C) segregation of duties.
D) frequent reconciliation of records.
Answer: C
29) A clerk at a grocery store scanned the bar code for a low cost bag of frozen chicken wings
then gave his friend an expensive brand-name bag of frozen chicken wings. Which of the
following controls would best prevent the clerk from getting away with doing this?
A) physical inventory count
B) segregation of duties
C) limited physical access to bar codes
D) use of RFID tags
Answer: D
30) The accounts receivable clerk destroys all invoices for sales made to family and friends
and does not record the sales in the accounts receivable subsidiary ledgers. The family and
friends usually give the clerk cash as a "thank you." Which procedure will not prevent or
detect this fraud?
A) Send monthly statements to all customers with balances owed.
B) Reconcile sales invoices in the billing department to the total debits to accounts receivable
subsidiary ledgers.
C) Sequentially prenumber all invoices and prepare a sequence check at the end of each day.
D) Reconcile the accounts receivable control account to the accounts receivable subsidiary
ledger.
Answer: A
183
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
32) The least effective control for preventing an organization from processing fraudulent
credit memo is to
A) match each credit memo with a receiving report.
B) require approval for each credit memo by the credit manager.
C) reconcile total of credit memos to total debits posted to customers' subsidiary ledgers.
D) sequentially prenumber all credit memos and perform a sequence check at the end of each
day.
Answer: C
40) Which of the following is not a threat to the revenue cycle sales order entry process?
A) incomplete orders
B) invalid orders
C) cash flow problems
D) uncollectible accounts
Answer: C
41) Which of the following is not a threat to the revenue cycle shipping process?
A) incomplete orders
B) inventory theft
C) picking the wrong items
D) wrong shipping address
Answer: A
42) Which of the following is not a threat to the revenue cycle billing process?
A) accounts receivable errors
B) loss of customers
C) failure to bill
D) inaccurate credit memos
Answer: B
184
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
43) Which of the following is not a general threat to the revenue cycle?
A) inaccurate master data
B) loss of customers
C) poor performance
D) unauthorized disclosure of sensitive information
Answer: B
44) Which of the following is not a general threat to the revenue cycle?
A) inaccurate master data
B) loss of customers
C) poor performance
D) unauthorized disclosure of sensitive information
Answer: B
Answer: A
Answer: A
47) For strongest segregation of duties, the credit manager should never report to
A) the marketing department.
B) the accounting department.
C) the credit department.
D) the IT department.
Answer: A
185
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
48) For strongest segregation of duties, a sales representative should never be allowed to
A) discuss the company's products.
B) negotiate the sales price.
C) approve a sale on credit.
D) send a customer a gift.
Answer: C
186
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
13.1 Explain the basic business activities and related information processing operations
performed in the expenditure cycle.
1) The Gwallter Reece Chihuahua Sweater Co. (GRCCo) was established in 2013. It recently
signed a large contract with PetCo pet stores. GRCCo will be required to track and forecast
sweater sales by linking in to PetCo's sales database. GRCCo will then be responsible for
shipping products to PetCo as needed. The relationship between GRCCo and PetCo is an
example of
A) sales force automation.
B) electronic data interchange.
C) optical character recognition.
D) vendor-managed inventory.
Answer: D
2) One of the basic activities in the expenditure cycle is the receiving and storage of goods,
supplies, and services. What is the counterpart of this activity in the revenue cycle?
A) sales order entry process
B) shipping function
C) cash collection activity
D) cash payments activity
Answer: B
Answer: C
4) Economic Order Quantity (EOQ) includes several variables that must be taken into
consideration when calculating the optimal order size. One variable, the costs associated with
holding inventory, is referred to as
A) ordering costs.
B) carrying costs.
C) the reorder point.
D) stockout costs.
187
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: B
6) Which electronic files are either read or updated when goods are ordered from a vendor?
A) inventory, vendors, and accounts payable
B) vendors and accounts payable
C) inventory, vendors, and open purchase orders
D) open purchase orders and accounts payable
Answer: C
Answer: B
Answer: A
188
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: B
11) What is the key difference between the MRP and JIT inventory management approaches?
A) Only JIT reduces costs and improves efficiency.
B) MRP is especially useful for products such as fashion apparel.
C) JIT is more effectively used with products that have predictable patterns of demand.
D) MRP schedules production to meet estimated sales needs; JIT schedules production to meet
customer demands.
Answer: D
12) When would an MRP inventory approach be a preferred to a JIT inventory approach?
A) when a product has a short life cycle
B) when demand for inventory is fairly predictable
C) when demand for inventory is very unpredictable
D) MRP is always a preferred method over JIT.
Answer: B
13) Which of the following is least likely to be a major criterion in vendor selection?
A) prices of goods
B) credit rating of the vendor
C) quality of goods
D) ability to deliver on time
Answer: B
14) Once a vendor is selected for a product, the vendor's identity is recorded in the
A) purchase requisition transaction file.
B) purchase requisition master file.
C) inventory transaction file.
D) inventory master file.
189
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
15) Duc An Incorporated provides free coffee to employees. Starbucks delivers coffee
packages, sugar, creamer, and filters each week. Every month, Starbucks sends Duc An an
invoice. This arrangement is best described as a
A) set purchase order.
B) fixed purchase order.
C) blanket purchase order.
D) standard purchase order.
Answer: C
16) A major cost in the purchasing function is the number of purchase orders processed. One
technique that may reduce purchasing-related expenses is to have suppliers compete with
each other to meet demand at the lowest price. The name of this technique is
A) an EDI auction.
B) a trading exchange.
C) a reverse auction.
D) a supplier consortium.
Answer: C
Answer: A
18) A receiving clerk notes that a delivery of 10 units has been received, but the purchase
order specified 12 units. A debit memo will need to be prepared to adjust for the difference
between the quantity ordered and received. Who should prepare this document?
A) the receiving clerk
B) the controller
C) the vendor
D) the purchasing department manager
Answer: D
19) Identify in which of the following scenarios a company could adjust the balance due the
vendor by issuing a debit memo.
190
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
20) What is one of the best ways to improve the overall efficiency and effectiveness of the
receipt and storage of ordered items?
A) requiring all suppliers to have the carrier verify quantities and item numbers before shipment
B) requiring all suppliers to include RFID tags on their items
C) requiring all suppliers to use EDI to expedite the receiving department function
D) requiring all delivery trucks to have satellite data terminals to expedite the receiving
department function
Answer: B
21) Vendor invoices are approved by the ________, which reports to the ________.
A) purchasing department; controller
B) accounts payable department; treasurer
C) purchasing department; treasurer
D) accounts payable department; controller
Answer: D
22) The disbursement voucher and supporting documents are sent to the ________ for
payment prior to the due date.
A) cashier
B) treasurer
C) controller
D) accounts payable department
Answer: A
23) A(n) ________ system posts an approved invoice to the vendor account and stores it in an
open invoice file until payment is made by check.
A) nonvoucher
B) voucher
C) cycle
D) evaluated receipt settlement
Answer: A
191
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
25) One objective of accounts payable is to authorize payment only for goods or services
actually ordered and received. The best way to process supplier invoices is to use
A) electronic funds transfer for small, occasional purchases from suppliers.
B) a nonvoucher system.
C) EDI for all small, occasional purchases from suppliers.
D) a disbursement voucher system.
Answer: D
Answer: D
Answer: D
Answer: B
192
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
29) When purchasing miscellaneous supplies, companies can reduce costs, improve efficiency,
and combat employee fraud by
A) using procurement cards.
B) implementing a JIT inventory system.
C) requiring employees to personally purchase items then reimbursing employees at the end of
each month.
D) paying amounts out of petty cash.
Answer: A
30) If available, a 1% discount for payment within 10 days instead of 30 days represents an
approximate savings of ________% annually.
A) 1
B) 12
C) 18
D) 36
Answer: C
31) There is a symmetrical interdependence between a firm's expenditure cycle and its
suppliers'
A) production cycle.
B) revenue cycle.
C) expenditure cycle.
D) general ledger and reporting system.
Answer: B
32) The Gwallter Reece Chihuahua Sweater Co. (GRCCo) was established in 2013. It recently
signed a large contract with PetCo pet stores. GRCCo will be required to track and forecast
sweater sales. The technology that is used for communication between GRCCo and PetCo is
A) electronic data interchange.
B) vendor-managed inventory.
C) sales force automation.
D) optical character recognition.
Answer: A
33) Ngai Nhung is the sales manager at Hung Technologies. At lunch with the company CEO,
Ngai proudly announced that he had negotiated a(n) ________ with a client that represented
the customer's long-term commitment to buy components from Hung.
193
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) purchase order
B) evaluated receipt settlement
C) voucher
D) blanket purchase order
Answer: D
34) Ngai Nhung is the sales manager at Hung Technologies. At lunch with the company CEO,
Ngai proudly announced that he had received a ________ from a client. The client had just
requested a large quantity of components from Hung.
A) blanket purchase order
B) voucher
C) purchase order
D) purchase requisition
Answer: C
35) Ngai Nhung is the sales manager at Hung Technologies. At lunch with the company CEO,
Ngai complained that a recent shipment from a vendor had been unsatisfactory and was
returned. As a result, Hung's purchasing manager needed to send a ________ to the supplier.
A) debit memo
B) purchase order
C) blanket purchase order
D) receiving report
Answer: A
36) To minimize the number of checks that need to be written to pay vendor invoices, a
company should use
A) a voucher system.
B) a just-in-time inventory system.
C) a nonvoucher system.
D) an evaluated receipt settlement system.
Answer: A
194
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
38) In the expenditure cycle, Financial Electronic Data Interchange (FEDI) increases efficiency
by
A) eliminating the need for receiving reports.
B) eliminating the need for vendor invoices.
C) eliminating the need for purchase orders.
D) eliminating the need to prepare and mail checks.
Answer: D
39) Procurement cards differ from corporate credit cards in which of the following ways?
A) Credit limits can be set for procurement cards, but not corporate credit cards.
B) Credit cards can be used to make purchases without an explicit sign off by supervisors, but
procurement cards require a sign off.
C) Procurement cards can only be used with approved vendors, but credit cards can be used
anywhere.
D) Procurement card invoices are sent separately for each card, whereas corporate credit cards
are consolidated into a single invoice.
Answer: C
46) Identify the department below that should not be able to submit a purchase requisition.
A) Marketing
B) Production
C) Inventory Control
D) None of the above
Answer: D
Answer: C
195
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) a credit manager.
Answer: B
49) Which of the following is not an activity performed in the expenditure cycle?
A) ordering
B) receiving
C) cash disbursement
D) shipping
Answer: D
Answer: A
Answer: D
54) Although there are some similarities between JIT and MRP, identify one major difference
below.
A) production scheduling
B) reducing the opportunity for inventory theft
C) reducing inventory carrying costs
D) requires more analysis than EOQ
Answer: A
55) Ideally, inventory purchases occur in response to ________ in a JIT inventory system.
A) customer demand
B) optimal demand
C) forecast demand
196
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) supplier demand
Answer: A
56) A JIT inventory system would be especially useful for a company that manufactures
A) toys associated with new movie releases.
B) toothpaste.
C) alarm clocks.
D) motor oil.
Answer: A
57) Which of the following factors is not of key importance when selecting inventory
suppliers?
A) product price
B) vendor corporate structure
C) product quality
D) vendor delivery dependability
Answer: B
58) MacDougalKids is a mid-sized manufacturer of organic baby food. MacDougalKids uses the
EOQ inventory management approach. Which of the following factors would likely be least
important when selecting inventory suppliers?
A) product price
B) product quality
C) vendor delivery dependability
D) All would be equally important.
Answer: C
Answer: A
13.2 Discuss the key decisions to be made in the expenditure cycle, and identify the
197
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) To accomplish the objectives set forth in the expenditure cycle, a number of key
management decisions must be addressed. Which of the decisions below is not ordinarily
found as part of the expenditure cycle?
A) How can cash payments to vendors be managed to maximize cash flow?
B) What is the optimal level of inventory and supplies to carry on hand?
C) Where should inventories and supplies be held?
D) What are the optimal prices for each product or service?
Answer: D
13.3 Identify major threats in the expenditure cycle, and evaluate the adequacy of various
control procedures for dealing with those threats.
1) Requiring all packing slips be reconciled to purchase orders before accepting a delivery of
inventory would be most likely to prevent which of the following situations?
A) A supplier delivers more inventory than ordered at the end of the year and sends an invoice
for the total quantity delivered.
B) An employee mails a fake invoice to the company, which is then paid.
C) The inventory records are incorrectly updated when a receiving department employee enters
the wrong product number on the receiving report.
D) Receiving department employees steal inventory and then claim the inventory was received
and delivered to the warehouse.
Answer: A
2) Comparing quantities on a vendor invoice to quantities on the receiving report would not
prevent or detect which of the following situations?
A) receiving and accepting inventory not ordered
B) theft of inventory by receiving department employees
C) update of wrong inventory items due to data entry error
D) order for an excessive quantity of inventory
Answer: A
3) Which of the following would probably be the least effective control to mitigate the risk of
paying a phony invoice payable for inventory purchases that were never made?
A) Only pay from original invoices.
B) Require three-way match for all inventory purchase invoices.
C) Cancel all invoices and supporting documentation when paid.
D) Establish strict access and authorization controls for the approved vendor master file.
198
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
4) Which of the following controls would be the least effective in preventing paying the same
invoice twice?
A) Only pay from original invoices.
B) Cancel each document in the voucher package once the check is prepared and mailed.
C) Only pay vendor invoices that have been matched and reconciled to a purchase order and a
receiving report.
D) Allow only the accounts payable department to authorize payment for vendor invoices and
allow only the cash disbursements department to cut and mail checks to vendors.
Answer: D
5) If duties are properly segregated, the authorization function is performed by ________, the
recording function is performed by ________, and cash handling is performed by the
________.
A) accounts payable; purchasing; cashier
B) purchasing; accounts payable; cashier
C) purchasing; cashier; accounts payable
D) purchasing; accounts payable; treasurer
Answer: B
6) Evaluated receipt settlement approves payment of vendor invoices after reconciling the
purchase order and the
A) receiving report.
B) vendor invoice.
C) sales invoice.
D) disbursement voucher.
Answer: A
7) What is the best control to mitigate the threat of paying prices that are too high for goods
ordered?
A) Require the receiving department to verify the existence of a valid purchase order.
B) Use only approved suppliers and solicit competitive bids.
C) Only pay invoices that are supported by the original voucher package.
D) Use bar-code technology to eliminate data entry errors.
Answer: B
199
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
8) What is the best way to prevent the acceptance of goods that were never ordered?
A) Order only from approved vendors.
B) Enforce an appropriate conflict of interest policy in place.
C) Match the packing slip to a purchase order before accepting delivery.
D) Require specific authorization from the purchasing manager before accepting any goods.
Answer: C
9) Which of the following is not a common control for ensuring inventory is secure and
inventory counts are accurate?
A) control of physical access to the inventory storage areas
B) transfers of inventory with proper documentation
C) sending "blind" copies of purchase orders to inventory control for data entry
D) making physical counts of inventory at least once per year
Answer: C
10) What control would best mitigate the threat of paying an invoice twice?
A) never authorizing payment of a photocopy of an invoice
B) double-checking mathematical accuracy of invoices
C) approval of purchase orders
D) maintaining adequate perpetual inventory records
Answer: A
11) Which control would best prevent payments made to fictitious vendors?
A) Allow payments only to approved vendors.
B) Restrict access to any payment or approval documents.
C) Have an independent bank reconciliation.
D) Make sure all documents are in order before approving payments.
Answer: A
12) In the expenditure cycle, good control dictates that expenditures should be paid by check.
This may not be feasible when minor purchases are made. To facilitate quick payment for
minor purchases, a(n) ________ should be set up and maintained using ________.
A) special bank account; disbursement vouchers
B) imprest fund; vouchers
C) cash box; small denomination bills
D) petty cash fund; procurement cards
Answer: B
200
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
13) A surprise count of an imprest petty cash fund should find the total of ________ equal to
the amount authorized for the fund.
A) cash and credit memos
B) cash and vouchers
C) cash
D) cash and checks
Answer: B
14) What control should be put in place that assigns responsibility for EFT payments made to
vendors?
A) Encrypt all EFT transmissions.
B) Time stamp all EFT transactions.
C) Establish a control group to monitor EFT transactions for validity and accuracy.
D) Number all EFT transactions.
Answer: C
15) Which of the following threats is not specific to the purchase requisition process of the
expenditure cycle?
A) stockouts
B) purchasing from unauthorized vendors
C) requisitioning goods not needed
D) All of the above are threats in the purchase requisition process.
Answer: B
16) The management at Barks-a-Million is considering a new inventory control system. The
current system is inadequate because it frequently causes stockouts that interrupt production
and lead to excess stock of other materials — resulting in markdowns and high carrying costs.
The new system will focus on ensuring that these costs are minimized. The new inventory
control system will likely employ
A) a reorder point.
B) a just-in-time inventory system.
C) the economic order quantity.
D) materials requirements planning.
Answer: C
17) The management at Barks-a-Million is considering a new inventory control system. The
current system is inadequate because it frequently causes stockouts that interrupt production
201
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
and lead to excess stock of other materials — resulting in markdowns and high carrying costs.
The new system will focus on ensuring that orders are placed with sufficient lead time to
prevent stockouts by using
A) a just-in-time inventory system.
B) the economic order quantity.
C) materials requirements planning.
D) a reorder point.
Answer: D
18) The management at Barks-a-Million is considering a new inventory control system. The
current system is inadequate because it frequently causes stockouts that interrupt production
and lead to excess stock of other materials — resulting in markdowns and high carrying costs.
The new system, which will focus on forecasting demand for Sad Clown's products, will likely
employ
A) a just-in-time inventory system.
B) the economic order quantity.
C) materials requirements planning.
D) a reorder point.
Answer: C
19) The management at Barks-a-Million is considering a new inventory control system. The
current system is inadequate because it frequently causes stockouts that interrupt production
and lead to excess stock of other materials — resulting in markdowns and high carrying costs.
The new system will focus on reducing or completely eliminating carrying costs, most likely
employing
A) a just-in-time inventory system.
B) a reorder point.
C) materials requirements planning.
D) the economic order quantity.
Answer: A
20) Anong Mali is the purchasing manager at Wattana Technologies. She has responsibility for
reviewing and authorizing purchase orders. She also reviews receiving reports, approves or
corrects them, and authorizes the cashier to pay vendor invoices. Which of the following
would correct control weaknesses related to these activities?
A) Controls are adequate under the current system.
B) Vendor invoices should be reviewed by accounts receivable and then cancelled when paid.
C) Vendor invoices should be reviewed by the purchasing manager to ensure that they are
correct.
202
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) Accounts payable should reconcile purchase orders, receiving reports, and invoices.
Answer: D
21) Anong Mali is the purchasing manager at Wattana Technologies. She has responsibility for
reviewing and authorizing purchase orders. Receiving reports are prepared by shipping and
receiving based on the relevant purchase order(s). Purchase orders, receiving reports, and
vendor invoices are reconciled by accounts payable, which authorizes payment. Which of the
following would correct control weaknesses related to these activities?
A) Controls are adequate under the current system.
B) Accounts payable should authorize purchase orders.
C) Receiving reports should be reviewed and corrected by the purchasing manager.
D) Vendor invoices should be reviewed by the purchasing manager to ensure that they are
correct.
Answer: A
22) The receiving clerk at Wattana Technologies examines incoming shipments and reconciles
their contents with the relevant purchase orders. A receiving report is then sent to accounts
receivable and the vendor's invoice is approved for payment. Which of the following would
correct control weaknesses related to these activities?
A) Accounts payable should reconcile the purchase order and the receiving report.
B) The invoice should be approved for payment by the shipping clerk after the purchase order
and receiving report are reconciled.
C) Invoices, purchase orders, and receiving reports should be reconciled by the receiving clerk.
D) Controls are adequate under the current system.
Answer: A
23) The receiving clerk at Wattana Technologies examines incoming shipments and checks
their purchase order numbers. A receiving report is then sent to accounts payable, where it is
reconciled with the relevant purchase orders and invoices and payment is authorized. Which
of the following would correct control weaknesses related to the clerk's activities?
A) Controls are adequate under the current system.
B) Vendor invoices should be approved for payment by the purchasing manager.
C) Purchase orders and receiving reports should be reconciled by the purchasing manager.
D) Vendor invoices should be approved for payment by the shipping clerk after the purchase
order and receiving report are reconciled.
Answer: A
24) Which of the controls below would be least effective at preventing a company from
203
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
25) Which of the following would be the best control to prevent receiving department
employees from stealing inventory and claiming the ordered quantity wasn't received from
the vendor?
A) Reconcile quantity on packing slip to physical count when accepting delivery.
B) Restrict physical access to the receiving area.
C) Require all deliveries be made at the receiving area.
D) Require dual signatures on the move ticket when receiving delivers the inventory to the
warehouse.
Answer: A
30) Identify one way to improve the accuracy of inventory records that use a perpetual
inventory approach
A) use of an ERP system
B) require the accounting department to calculate cost of goods sold periodically
C) use IT to eliminate the need for manual data entry
D) use of an MRP inventory system
Answer: C
Answer: C
33) What is the main reason a list of potential alternative suppliers be maintained?
A) in case the primary supplier is out of stock
B) so the firm can sample different suppliers
C) in case the primary supplier is more expensive
D) to segregate purchasing suppliers
204
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: B
35) Identify item below that is the biggest purchasing function cost driver.
A) the number of purchase requisitions processed
B) the number of suppliers used
C) the number of purchase orders processed
D) the quantity of items ordered
Answer: C
Answer: B
37) One way a firm could reduce the risk of problems with supplier dependability is to
A) purchase inventory from only U.S.-based suppliers.
B) use an ERP system for purchases.
C) require suppliers to be ISO 9000 certified.
D) automate the purchasing function.
Answer: C
38) An important control that can be used to reduce the risk of employee kickbacks is
A) surveillance cameras.
B) job rotation.
C) off-site restrooms.
D) use of ID badges.
Answer: B
205
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
206
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
14.1 Describe the major business activities and related information processing operations
performed in the production cycle.
1) The AIS compiles and feeds information among the business cycles. What is the
relationship between the revenue and production cycles regarding the exchange of
information?
A) The revenue cycle provides sales forecast and customer order information to the production
cycle, but the production cycle sends information back to revenue about finished goods
production.
B) The revenue cycle receives information from the production cycle about raw materials needs.
C) The production cycle sends cost of goods manufactured information back to the revenue
cycle.
D) The production cycle does not exchange information with the revenue cycle.
Answer: A
Answer: D
3) The production cycle differs from the revenue and expenditure cycles for all the following
reasons except
A) cost accounting is involved in all activities.
B) not all organizations have a production cycle.
C) there are no direct external data sources or destinations.
D) very little technology exists to make activities more efficient.
Answer: C
Answer: A
207
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: D
Answer: A
Answer: B
9) What is the main difference between MRP-II and JIT manufacturing systems?
A) The length of the planning horizon
B) JIT uses long-term customer demand for planning purposes, but MRP-II uses short-term
customer demand for planning purposes.
C) MRP-II relies on EDI, but JIT does not.
D) There are no significant differences between MRP-II and JIT.
Answer: A
208
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
11) The ________ is the production cycle document that specifies the quantity of each
product to be produced and when production should begin.
A) receiving report
B) bill of lading
C) master production schedule
D) operations list
Answer: C
Answer: D
13) The ________ authorizes the transfer of raw materials from the storeroom to the
production floor.
A) bill of materials
B) production order
C) materials requisition
D) move ticket
Answer: C
14) ________ is an efficient way to track and process information about raw materials used in
production.
A) A just-in-time inventory system
B) Identifying materials with bar codes or RFID tags
C) A materials resources planning inventory system
D) Job-order costing
Answer: B
15) The use of various forms of information technology in the production process is referred
209
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
to as
A) computerized investments and machines.
B) computerized integration of machines.
C) computer-integrated manufacturing.
D) computer intense manufacturing.
Answer: C
16) Using technology such as robots and computer-controlled machinery to shift from mass
production to custom order manufacturing is referred to as
A) computer integrated manufacturing (CIM).
B) lean manufacturing.
C) Six Sigma.
D) computer-aided design (CAD).
Answer: A
17) Direct labor must be tracked and accounted for as part of the production process.
Traditionally, direct labor was tracked using ________ but an AIS enhancement is to use
________ to record and track direct labor costs.
A) job-time tickets; coded identification cards
B) move tickets; coded identification cards
C) employee earnings records; job-time tickets
D) time cards; electronic time entry terminals
Answer: A
18) Yasamin Roshni owns and operates a small deli in Miami, Florida. She maintains a file that
contains the ingredients used to make each of her famous subs. The ingredients needed to
make a specific sub are most similar to a(n)
A) operations list.
B) production order.
C) bill of materials.
D) materials requisition.
Answer: C
19) Yasamin Roshni owns and operates a small deli in Miami, Florida.. She maintains a file
that lists the steps required to make each of her famous subs. These step-by-step instructions
are examples of a(n)
A) operations list.
B) bill of materials.
210
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) production order.
D) materials requisition.
Answer: A
20) Yasamin Roshni owns and operates a small deli in Miami, Florida. Each morning she
prepares a list that describes the quantity and variety subs that will be prepared during the
day. This list is an example of a(n)
A) bill of materials.
B) operations list.
C) materials requisition.
D) production order.
Answer: D
21) Yasamin Roshni owns and operates a small deli in Miami, Florida. Each afternoon, she
prepares a shopping list that describes the quantity and variety of ingredients that she will
purchase in the evening from her wholesaler. The shopping list is an example of a(n)
A) bill of materials.
B) materials requisition.
C) operations list.
D) production order.
Answer: B
22) Labor productivity is measured by the quantity produced divided by the labor time
required to produce it. All other things held constant, an increase in labor productivity will
increase throughput by
A) increasing productive capacity.
B) increasing productive processing time.
C) increasing yield.
D) increasing all components of throughput.
Answer: A
23) Sule Technologies installed a new production monitoring system that will reduce system
breakdowns by 35%. The new system will increase throughput by
A) increasing productive capacity.
B) increasing yield.
C) increasing productive processing time.
D) increasing all components of throughput.
211
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
24) Gulshan Parvana operates a machine shop in Istanbul, Turkey. She places bids on small
projects in the metropolitan area. Which of the following is most likely to be a cost driver that
should be considered when determining how to allocate utility costs?
A) number of projects completed
B) number of units produced
C) number of labor hours
D) sales revenue
Answer: A
25) Sule Technologies initiated a just-in-time inventory system in 2013. Now the production
manager, Chan Ziaou, wants to apply the same principles to the entire production process. His
recommendation is that Sule adopt a
A) master production scheduling system.
B) lean manufacturing system.
C) manufacturing resource planning system.
D) computer-integrated manufacturing system.
Answer: B
A) Materials Requisition.
B) Production Order.
C) Bill of Materials.
D) Move Ticket between production and warehouse functions.
Answer: A
212
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
32) How can CAD software help improve the efficiency and effectiveness of the product design
process?
A) It can eliminate the costs associated with creating and destroying physical prototypes.
B) It can simulate how new products will be manufactured.
C) It can store all the data associated with all products.
D) All of the above
Answer: A
33) How can PLM software improve the efficiency and effectiveness of the product design
process?
A) It can eliminate the costs associated with creating and destroying physical prototypes.
B) It can simulate how new products will be manufactured.
C) It can store all the data associated with all products.
D) All of the above
Answer: A
34) What issue did Airbus encounter when using CAD software to help design the A380
Superjumbo airliner?
A) The actual A380 was heavier than the CAD model.
B) The actual A380 was not able to carry as much weight as the CAD model.
C) Design teams used different versions of the same CAD software, resulting in key information
loss.
D) The CAD software was not advanced enough to help design the A380.
Answer: B
Answer: B
14.2 Identify major threats in the production cycle and evaluate the adequacy of various
control procedures for dealing with those threats.
213
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) stand-by facilities.
B) adequate insurance coverage.
C) source data automation.
D) All of the above are correct.
Answer: B
Answer: B
3) What specific control can help restrict the rights of authorized users to only the portion of a
database needed to complete their specific job duties?
A) an access control matrix
B) passwords and user IDs
C) closed-loop verification
D) specific authorization
Answer: A
4) An organization can implement which of the following controls to reduce the threat of
inventory theft or damage?
A) review and approval of fixed asset acquisitions
B) improved and more timely reporting
C) better production and planning systems
D) document all movement of inventory through the production process
Answer: D
Answer: D
214
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
counteract the general threat that the loss of production data will greatly slow or halt
production activity?
A) Store key master inventory and production order files on-site only to prevent their theft.
B) Back up data files only after a production run has been physically completed.
C) Access controls should apply to all terminals within the organization.
D) Allow access to inventory records from any terminal within the organization to provide
efficient data entry.
Answer: C
Answer: D
Answer: D
Answer: B
10) The expenses associated with the use of clean rooms in the production of computer hard
drives are ________ costs.
A) prevention
B) inspection
C) internal failure
D) external failure
Answer: A
215
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
11) The expenses associated with disposal of defective products are ________ costs.
A) prevention
B) inspection
C) internal failure
D) external failure
Answer: C
12) In addition to identifying and dealing with defective products before they reach
customers, quality management is concerned with initiating process changes that will reduce
the number of defective units produced. All other things held constant, a decrease in the
number of defective units will increase throughput by
A) increasing productive capacity.
B) increasing productive processing time.
C) increasing yield.
D) increasing all components of throughput.
Answer: C
15) Identify one control that can be used to mitigate the threat of poor product design that
results in excess costs.
A) production planning systems
B) analysis of warranty and repair costs
C) encryption
D) insurance
Answer: B
16) Identify one control that can be used to mitigate the threat of under-production.
A) production planning systems
B) analysis of warranty and repair costs
C) encryption
D) insurance
Answer: A
17) The risks associated with over-production are likely of greatest concern to which company
below?
A) a cereal manufacturer
B) a manufacturer that produces designer clothing
C) a manufacturer of printer paper
216
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) a mailbox manufacturer
Answer: B
18) To control for risks associated with the threat of inventory loss, who should have primary
responsibility for work-in-process inventories?
A) a factory supervisor
B) the inventory stores department
C) purchasing
D) the receiving department
Answer: A
Answer: C
20) The VP of Manufacturing at Roshanak Incorporated wants to buy a new die cast machine
for production. The die cast machine is expected to cost around $1,000,000. Which
document will most likely be used to solicit bids from suppliers?
A) RFP
B) eVoice
C) RFJ
D) RFB
Answer: A
14.3 Explain how a company's cost accounting system can help it achieve its manufacturing
goals.
1) Which objective listed below is not a cost accounting objective for the production cycle?
A) Provide information for planning, controlling, and evaluating the performance of production
operations.
B) Provide cost data about products used in pricing and product mix decisions.
C) Collect and process the information used to calculate inventory and cost of goods sold
amounts that appear in the financial statements.
D) Provide tests of audit control functions as part of the AIS.
217
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
2) Which type of information below should not be maintained by the AIS in accounting for
fixed assets?
A) identification/serial number
B) cost
C) improvements
D) market value
Answer: D
3) Detailed data about reasons for warranty and repair costs is considered an applicable
control used to mitigate the threat of
A) underproduction.
B) overproduction.
C) poor product design.
D) suboptimal investment of fixed assets.
Answer: C
4) What is the primary drawback to using a volume-driven base, such as direct labor or
machine hours, to apply overhead to products in a traditional cost accounting system?
A) The cost accountant may not fully understand how to track direct labor or machine hours.
B) It is difficult for an AIS to incorporate such a measurement into its system.
C) It is difficult for an ERP to incorporate such a measurement into its integrated system.
D) Many overhead costs are incorrectly allocated to products since they do not vary with
production volume.
Answer: D
5) ________ identifies costs with the corporation's strategy for production of goods and
services.
A) Activity-based costing
B) Job-order costing
C) Process costing
D) Manufacturing costing
Answer: A
218
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) cost driver.
D) cost catalyst.
Answer: C
7) What does the first term in the throughput formula, productive capacity, represent?
A) the maximum number of units that can be produced given current technology
B) the percentage of total production time used to manufacture a product
C) the percentage of "good" units produced given current technology
D) the percentage of "bad" units produced given current technology
Answer: A
8) ________ are incurred to ensure that products are created without defects the first time.
A) External failure costs
B) Inspection costs
C) Internal failure costs
D) Prevention costs
Answer: D
9) ________ are associated with testing to ensure that products meet quality standards.
A) External failure costs
B) Inspection costs
C) Internal failure costs
D) Prevention costs
Answer: B
Answer: D
11) Elif Package Delivery determines the cost per delivery by summing the average cost of
loading, unloading, transporting, and maintenance. What costing approach does Elif Package
Delivery use?
A) job-order
B) unit-based
219
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) process
D) activity-based
Answer: C
12) Elif Package Delivery determines the cost per delivery by averaging total cost over the
number of deliveries. What costing approach does Elif Package Delivery use?
A) unit-based
B) job-order
C) process
D) activity-based
Answer: B
13) Elif Package Delivery calculates the cost per delivery by identifying variables as cost
drivers, and allocating overhead accordingly. What costing approach does Elif Package
Delivery use?
A) job-order
B) activity-based
C) unit-based
D) process
Answer: B
14) In activity-based costing, expenses associated with the purchase of health care insurance
for employees are ________ overhead.
A) batch-related
B) product-related
C) company wide
D) expenditure-based
Answer: C
15) In activity-based costing, the expenses associated with planning and design of new
products are ________ overhead.
A) batch-related
B) product-related
C) company wide
D) expenditure-based
Answer: B
220
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
16) At the end of each production run, preventive maintenance is done on the assembly line.
The expenses associated with this maintenance are ________ overhead.
A) batch-related
B) product-related
C) company wide
D) department-based
Answer: A
Answer: A
23) Traditionally, what did manufacturing firms use to track the amount of time a worker
spends on each specific task?
A) job-time ticket
B) barcoded ID card
C) clock punchcard
D) RFID chips
Answer: A
Answer: C
25) Identify the cost below most likely to be classified as manufacturing overhead.
A) production workers' pay
B) raw materials used in production
C) insurance
D) none of the above
Answer: C
221
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
14.4 Discuss the key decisions that must be made in the production cycle and identify the
information required to make those decisions.
2) Identify the role below that accountants can play in the production cycle.
A) participate in product design
B) perform cost analysis
C) help an organization choose an inventory control system
D) all of the above
Answer: D
3) Why might an organization find it most beneficial to involve accountants in product design?
A) because generally at least 65% of product costs are determined in the design stage and
accountants can help minimize product costs
B) because accountants are generally able to improve the quality of new products
C) because involving accountants in product design boosts firm morale
D) because accountants are generally able to identify what consumers want in a new product
Answer: A
16.1 Describe the information processing operations required to update the general ledger and
to produce reports for internal and external users.
222
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) The general ledger and reporting system consists of the ________ involved in ________ the
general ledger and ________ reports.
A) business transactions; updating; processing
B) data processing; business transactions for; printing
C) information processing; updating; creating
D) business transactions; data processing; preparing
Answer: C
2) Which item below is not considered a major input to the general ledger and reporting
system?
A) summary entries from the major subsystems
B) reports from managers
C) adjusting entries
D) financing and investing activities
Answer: B
3) Who should provide the adjusting entries in a well-designed general ledger and reporting
system?
A) various user departments
B) the treasurer's area
C) the other major AIS subsystems
D) the controller's area
Answer: D
4) Which of the following user groups generally receive information produced by the general
ledger and reporting system?
A) internal users
B) external users
C) inquiry processing by internal or external users
D) all of the above
Answer: D
5) The general ledger system of an organization should be designed to serve the information
requirements of both internal and external users. This means that the system should support
A) producing expansive regular periodic reports to cover all information needs.
B) the real-time inquiry needs of all users.
C) producing regular periodic reports and respond to real-time inquiry needs.
223
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
6) Identify the most correct statement with regard to how the various accounting subsystems
update the general ledger.
A) Individual journal entries for each accounting subsystem transaction update the general
ledger every 24 hours.
B) Summary journal entries that represent the results of all transactions for a certain time
period are used to update the general ledger.
C) The controller or treasurer must approve accounting subsystem journal entries before any
updating may occur.
D) Nonroutine transactions are entered into the system by the treasurer's office.
Answer: B
7) When updating the general ledger, sales, purchases, and production are examples of
________ entries, and issuance or retirement of debt and the purchase or sale of investment
securities are examples of ________ entries.
A) adjusting; controller originated
B) accounting subsystem; treasurer originated
C) adjusting; special journal
D) controller generated; special journal
Answer: B
8) Which of the following are used to document entries made to update the general ledger?
A) general journal
B) subsidiary journal
C) subsidiary ledgers
D) journal vouchers
Answer: D
9) Not all journal entries affect cash flow. Adjusting entries that reflect events that have
already occurred, but have no effect on cash, are classified as
A) accruals.
B) deferrals.
C) revaluations.
D) corrections.
Answer: A
224
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
11) Identify the adjusting entry that is made at the end of an accounting period to reflect an
exchange of cash prior to the performance of a related event is classified as a(n)
A) accrual entry.
B) deferral entry.
C) revaluation entry.
D) correcting entry.
Answer: B
12) Depreciation expense and bad debt expense are examples of which type of adjusting
journal entry?
A) deferrals
B) accruals
C) revaluations
D) estimates
Answer: D
13) Adjusting entries that are made to reflect differences between the actual and recorded
value of an asset or a change in accounting principle are called
A) reconciliations.
B) revaluations.
C) estimates.
D) accruals.
Answer: B
14) Adjusting entries that are made to counteract the effects of errors found in the general
ledger are called
A) accruals.
B) corrections.
C) deferrals.
225
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) estimates.
Answer: B
Answer: C
16) Immediately after the adjusting entries are posted, the next step in the general ledger and
reporting system is to prepare
A) an adjusted trial balance.
B) closing entries.
C) financial statements.
D) an unadjusted trial balance.
Answer: A
17) Financial statements are prepared in a certain sequence. Which statement is prepared
last?
A) the adjusted trial balance
B) the income statement
C) the balance sheet
D) the statement of cash flows
Answer: D
Answer: A
19) Who generally is responsible for providing the accounting department with information
about financing and investing activities to create the appropriate general ledger journal
entries?
226
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) budget department
B) controller
C) treasurer
D) chief executive officer
Answer: C
20) Adjusting entries that are made to recognize revenue that has been received but not yet
earned are classified as
A) estimates.
B) deferrals.
C) accruals.
D) revaluations.
Answer: B
21) Adjusting entries that reflect a change in accounting principle used to value inventories
are classified as
A) corrections.
B) estimates.
C) deferrals.
D) revaluations.
Answer: D
16.2 Identify the major threats in general ledger and reporting activities and evaluate the
adequacy of various control procedures for dealing with them.
1) If you believe not all adjusting entries were posted in the general ledger, you should
prepare a general ledger control report listing journal vouchers in
A) numerical sequence.
B) chronological order.
C) general ledger account number order.
D) any order, since you have to review them all anyway.
Answer: A
2) If you believe a general ledger account was not adjusted properly or at all, you should
prepare a general ledger control report listing journal vouchers in
A) numerical sequence.
B) chronological order.
C) general ledger account number order.
227
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
3) Which of the following are appropriate controls for the general ledger and reporting
system?
A) using well-designed documents and records
B) online data entry with the use of appropriate edit checks
C) prenumbering documents and accounting for the sequence numbers
D) All of the above are appropriate.
Answer: D
4) A type of data entry control that would ensure that adjusting entries are posted to existing
general ledger accounts is called a(n) ________ check.
A) validity
B) existence
C) closed loop verification
D) reasonableness
Answer: A
5) One way of ensuring that recurring adjusting journal entries are made each month would
be to
A) make all the entries a month in advance.
B) rotate the responsibility among the accounting staff.
C) program the entries to be made automatically.
D) create a standard adjusting journal entry file.
Answer: D
6) Which of the following tasks are facilitated by maintaining a strong and secure audit trail?
A) tracing a transaction from original source document to the general ledger to a report
B) tracing an item in a report back through the general ledger to the original source document
C) tracing changes in general ledger accounts from beginning to ending balances
D) All of the above are facilitated by the audit trail.
Answer: D
228
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
7) Marina Filimena is an accountant at Jasmina Hair Products. Marina received the following
error message while making an adjusting entry to the general ledger: "The account number
referenced in your journal entry does not exist. Create a new account?" This is an example of
a
A) validity check.
B) closed loop verification.
C) zero-balance check.
D) completeness test.
Answer: A
8) Marina Filimena is an accountant at Jasmina Hair Products. Marina received the following
error message while making an adjusting entry to the general ledger: "Your journal entry must
be a numeric value. Please reenter." This is an example of a
A) validity check.
B) field check.
C) zero-balance check.
D) completeness test.
Answer: B
9) Marina Filimena is an accountant at Jasmina Hair Products. Marina received the following
error message while making an adjusting entry to the general ledger: "The amounts debited
and credited are not equal. Please correct and try again." This is an example of a
A) validity check.
B) field check.
C) zero-balance check.
D) completeness test.
Answer: C
10) Marina Filimena is an accountant at Jasmina Hair Products. Marina received the following
error message while making an adjusting entry to the general ledger: "The data you have
entered does not include a source reference code. Please enter this data before saving." This
is an example of a
A) validity check.
B) field check.
C) zero-balance check.
D) completeness test.
Answer: D
229
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
14) What system privileges should an employee involved in the general ledger and reporting
system be given?
A) general privileges to create, delete, update, or modify data
B) no privileges permitting the creation, deletion, updating, or modification of data
C) only the specific privileges necessary to perform an employee's assigned duties
D) read-only privileges
Answer: C
15) What control procedure(s) should be used to reduce the risk of unauthorized disclosure of
the financial statements?
A) multifactor authentication
B) physical security
C) encryption
D) all of the above
Answer: D
16) What control procedure(s) should be used to reduce the risk of the destruction of financial
statement master data?
A) multifactor authentication
B) backup and disaster recovery
C) encryption
D) all of the above
Answer: B
16.3 Understand the implications of new IT developments, such as XBRL, and changes in the
external reporting requirements, such as IFRS, for the design and operation of the general
ledger and reporting system.
230
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: C
3) Communications technology and the Internet can be used to reduce the time and costs
involved in disseminating financial statement information. Users of such financial information
still struggle in that many recipients have different information delivery requirements and
may have to manually reenter the information into their own decision analysis tools. The
ideal solution to solve these problems and efficiently transmit financial information via the
Internet is to use
A) HTML code.
B) XML.
C) pdf file.
D) XBRL.
Answer: D
4) Which of the following statements is not true about an XBRL instance document?
A) An instance document includes instruction code as to how the document should be
physically arranged and displayed.
B) An instance document contains facts about specific financial statement line items.
C) An instance document uses separate tags for each specific element.
D) An instance document can be used to tag financial and nonfinancial elements.
Answer: A
231
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: A
Answer: A
Answer: A
10) Identify the year the SEC will require American companies to switch from U.S.-based
GAAP to IFRS as the basis for preparing financial statements.
A) 2016
B) 2018
232
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) 2020
D) At this point it is unclear when the SEC will require American companies to implement IFRS,
though the SEC remains committed to requiring U.S. companies use IFRS at some point.
Answer: A
11) A major way in which IFRS differs from GAAP that will affect the design of a company's
general ledger and reporting system is an IFRS principle known as
A) componentization.
B) monetization.
C) securitization.
D) none of the above
Answer: A
12) At a minimum, a switch to IFRS from GAAP will affect companies' accounting information
system by
A) requiring companies to increase the processing power of their existing accounting
information systems.
B) requiring IT departments to hire programmers that are fluent in languages besides English.
C) requiring the creation of additional fields in research and development (R&D) records to
capture information about the stage of research and development that costs are incurred in.
D) requiring firms to completely redesign their existing accounting information systems because
current systems are not compatible with IFRS accounting principles.
Answer: C
Answer: A
Answer: B
233
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
16.4 Discuss how tools like responsibility accounting, balanced scorecards, and graphs can be
used to provide information managers need to effectively monitor performance.
1) The ________ is the managerial report that shows planned cash inflows and outflows for
major investments or acquisitions.
A) journal voucher list
B) statement of cash flows
C) operating budget
D) capital expenditures budget
Answer: D
Answer: C
3) Budgets used for internal planning purposes and performance evaluation should be
developed on the basis of
A) responsibility accounting.
B) generally accepted accounting principles.
C) financial accounting standards.
D) managerial accounting standards.
Answer: A
4) Performance reports for cost centers should compare actual versus budget ________ costs.
A) controllable
B) uncontrollable
C) fixed
D) variable
Answer: A
5) Performance reports for sales departments should compare actual revenue versus
budgeted
A) revenue.
B) cost.
234
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) return on investment.
D) profit.
Answer: A
6) Departments that mostly provide services to other units and charge those units for services
rendered should be evaluated as ________ centers.
A) cost
B) profit
C) investment
D) revenue
Answer: B
7) As responsibility reports are rolled up into reports for higher level executives, they
A) become less detailed.
B) become more detailed.
C) become narrower in scope.
D) look about the same.
Answer: A
8) Variances for variable costs will be misleading when the planned output differs from
budgeted output. A solution to this problem would be
A) calling all costs fixed.
B) to use flexible budgeting.
C) better prediction of output.
D) to eliminate the budgeting process.
Answer: B
Answer: B
10) Which of the following is not one of the principles of proper graph design for bar charts?
A) Include data values with each element.
235
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
11) Which of the following statements is true about the chart below?
A) The x-axis is in reverse chronological order, which violates a principle of proper graph design.
B) The chart appears to conform to the principles of proper graph design.
C) The vertical axis doesn't appear to start at the origin (zero).
D) The chart used 2-D bars instead of 3-D, which violates a principle of proper graph design.
Answer: A
15) The balanced scorecard attempts to solve what major issue associated with traditional
accounting reports?
A) Traditional accounting reports focus too narrowly on financial performance.
B) Traditional accounting reports are not easily understood by non-accountants.
C) Traditional accounting reports are expensive to produce.
D) Traditional accounting reports are produced too slowly to provide value.
Answer: A
16) Which of the following is not a perspective reflected in the balanced scorecard?
A) customer perspective
236
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
18) Which type of graph is the most commonly used to display trends in financial data?
A) pie chart
B) scatterplot chart
C) bar chart
D) stochastic chart
Answer: C
19) Which of the following balanced scorecard dimensions provides measures on new
products?
A) financial
B) internal operations
C) innovation and learning
D) customer
Answer: C
237
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
4.1 Explain the importance and advantages of databases, as well as the difference between
database systems and file-based legacy systems.
Answer: C
Answer: D
Answer: B
Answer: B
238
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Which is probably the most immediate and significant effect of database technology on
accounting?
A) replacement of the double entry-system
B) change in the nature of financial reporting
C) elimination of traditional records such as journals and ledgers
D) quicker access to and greater use of accounting information in decision-making
Answer: D
6) Shahnaz Vijaya is a new graduate who has been hired by a family-owned furniture
manufacturing company in the south. She has been asked to analyze the company's
accounting information system and to recommend cost-effective improvements. After noting
that the production and sales departments use database systems that are entirely separated,
she recommends that they be combined. Implementation of her recommendation would
benefit the company by contributing to data
A) independence.
B) integration.
C) redundancy.
D) qualifications.
Answer: B
7) Merlin Frodo has been doing custom piercings and tattoos for over thirty years. His home
and place of business is a garage in the harbor district of Seattle, Washington. He keeps
meticulous records of every job he has ever completed. These have been entered into a
computerized accounting information system that his accountant refers to as a "data
warehouse." Merlin is considering adding scarification to his service offerings and has asked
his accountant to identify past customers who might be likely candidates for this service.
Merlin wants his accountant to engage in
A) customer auditing.
B) customer resource management.
C) data mining.
D) enterprise resource planning.
Answer: C
239
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: A
13) The use of a data warehouse in strategic decision making is often referred to as
A) business intelligence.
B) managerial accounting.
C) data analysis.
D) analytical modeling.
Answer: A
4.2 Explain the difference between logical and physical views of a database.
Answer: C
240
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) how master files store data values used by more than one application program.
Answer: A
4.3 Explain fundamental concepts of a database system such as DBMS, schemas, the data
dictionary, and DBMS languages.
1) What acts as an interface between the database and the various application programs?
A) data warehouse
B) database administrator
C) database system
D) database management system
Answer: D
2) The combination of the database, the DBMS, and the application programs that access the
database through the DBMS is referred to as the
A) data warehouse.
B) database administrator.
C) database system.
D) database management system.
Answer: C
Answer: C
4) The ________ handles the link between the way data are physically stored and each user's
logical view of that data.
A) database management software (DBMS)
B) database manager
C) data warehouse
241
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) data dictionary
Answer: A
Answer: B
6) The schema that provides an organization-wide view of the entire database is known as the
A) external-level schema.
B) internal-level schema.
C) conceptual-level schema.
D) logical view of the database.
Answer: C
Answer: C
8) A low-level view of the database that describes how the data are actually stored and
accessed is the
A) conceptual-level schema.
B) subschema.
C) internal-level schema.
D) external-level schema.
Answer: C
242
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
9) Record layouts, definitions, addresses, and indexes will be stored at the ________ level
schema.
A) external
B) conceptual
C) internal
D) meta
Answer: C
10) The ________ contains information about the structure of the database.
A) data definition language
B) data dictionary
C) data warehouse
D) database management system
Answer: B
11) Which of the following would not be found in a data dictionary entry for a data item?
A) records containing a specific data item
B) physical location of the data
C) source of the data item
D) field type
Answer: B
Answer: A
13) Reports produced using the data dictionary could include all of the following except a list
of
A) programs where a data item is used.
B) synonyms for the data items in a particular file.
243
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
14) Which statement below concerning the database management system (DBMS) is false?
A) The DBMS automatically creates application software for users, based on data dictionary
parameters.
B) The DBMS automatically maintains the data dictionary.
C) Users' requests for information are transmitted to the DBMS through application software.
D) The DBMS uses special languages to perform specific functions.
Answer: A
15) Which would not generally be considered a data dictionary output report?
A) a list of cash balances in the organization's bank accounts
B) a list of all programs in which a data element is used
C) a list of all synonyms for the data elements in a particular file
D) a list of all data elements used by a particular user
Answer: A
16) Creating an empty table in a relational database requires use of the ________, and
populating that table requires the use of ________.
A) DDL; DML
B) DQL; SQL
C) DDL; DQL
D) DML; DDA
Answer: A
17) When the human resources manager wants to gather data about salary and start date by
employees and by departments, the manager would use which language?
A) Data Manipulation Language
B) Data Query Language
C) Data Report Language
D) Data Definition Language
244
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
18) If a national sales tax were implemented, which language would be used to add a new
field in the sales table to track the sales tax due?
A) Data Definition Language
B) Data Manipulation Language
C) Data Query Language
D) Data Update Language
Answer: A
19) ________ is a feature in many database systems that simplifies the creation of reports by
allowing users to specify the data elements desired and the format of the output.
A) Report printer
B) Report creator
C) Report generator
D) Report writer
Answer: D
Answer: B
21) In a well-designed and normalized database, which of the following attributes would be a
foreign key in a cash receipts table?
A) customer number
B) cash receipt date
C) remittance advice number
D) customer check number
Answer: A
245
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
22) Cornelia Cassidy is a telecom equipment sales representative. Her company has provided
her with a laptop computer that uses wireless connectivity to access the accounting
information system from virtually anywhere in the country. She, and other sales reps, have
access to view customer and product information. All sales reps also have access that allows
them to enter and cancel customer orders. The permissions for Cornelia define a ________ in
the company's database management system.
A) conceptual-level schema
B) subschema
C) data dictionary
D) physical view
Answer: B
23) Cornelia Cassidy is a telecom equipment sales representative. Her company has provided
her with a laptop computer that uses wireless connectivity to access the accounting
information system from virtually anywhere in the country. She has access to view customer
and product information. She also has access that allows her to enter and cancel customer
orders. The permissions for Cornelia (and other sales reps) define a ________ in the
company's database management system.
A) conceptual-level schema
B) data dictionary
C) external-level schema
D) physical view
Answer: C
29) The REA is an example of a database that uses a ________ data modeling approach to
database design.
A) schema
B) logical
C) semantic
D) normalization
Answer: C
246
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: A
3) The ________ occurs when more than one occurrence of a specific data item in a database
exists.
A) inconsistency anomaly
B) insert anomaly
C) delete anomaly
D) update anomaly
Answer: D
4) Inability to add new data to a database without violating the basic integrity of the database
is referred to as the
A) update anomaly.
B) insert anomaly.
C) integrity anomaly.
D) delete anomaly.
Answer: B
247
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) an update anomaly.
B) an insert anomaly.
C) a delete anomaly.
D) an integrity anomaly.
Answer: B
6) The problem of losing desired information from a database when an unwanted record is
purged from the database is referred to as the ________ anomaly.
A) purge
B) erase
C) delete
D) integrity
Answer: C
Answer: C
Answer: A
9) Identify one potential drawback in the design and implementation of database systems for
accounting.
A) Double-entry accounting relies on redundancy as part of the accounting process, but well-
designed database systems reduce and attempt to eliminate redundancy.
248
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) Relational DBMS query languages will allow financial reports to be prepared to cover
whatever time periods managers want to examine.
C) Relational DBMS provide the capability of integrating financial and operational data.
D) Relational DBMS can accommodate multiple views of the same underlying data; therefore,
tables storing information about assets can include data about both historical and replacement
costs.
Answer: A
10) Kai Keoni has created custom statues made out of scrap metal for over ten years. He lives
above his shop in Martha's Vineyard, Maryland. Kai is an accounting fanatic and has kept
detailed records of every statue he has ever created. For every sale, he obtains the customer's
name and address, a description of the statue, and a picture of the statue sold to the
customer. His unique style has recently attracted the attention of several celebrities. Ready to
take his business to the next level, Kai has hired you to construct an accounting information
system, which he wants modeled after his paper records. As you look over his records, you
realize that sometimes the same customer is recorded by a slightly different name. For
example, Mike Mulligan bought a horse statue, M. Mulligan bought a pig statue, and Mike M.
all seem to be the same person. This is an example of what type of problem in the existing
records?
A) entity integrity
B) referential integrity
C) update anomaly
D) insert anomaly
Answer: C
11) Kai Keoni has created custom statues made out of scrap metal for over ten years. He lives
above his shop in Martha's Vineyard, Maryland. Kai is an accounting fanatic and has kept
detailed records of every statue he has ever created. For every sale, he obtains the customer's
name and address, a description of the statue, and a picture of the statue sold to the
customer. His unique style has recently attracted the attention of several celebrities. Ready to
take his business to the next level, Kai has hired you to construct an accounting information
system, which he wants modeled after his paper records. As you look over his records, you
realize that some customers bought multiple statues at the same time. For example, Yasmeen
Ghuari bought a Tin Man Status, a flying horseman statue, and a terrier statue. You realize
249
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
that in these cases, a single written record will have to be translated into multiple sales
records. This is an example of what type of problem in the existing records?
A) entity integrity
B) referential integrity
C) update anomaly
D) insert anomaly
Answer: D
12) Kai Keoni has created custom statues made out of scrap metal for over ten years. He lives
above his shop in Martha's Vineyard, Maryland. Kai is an accounting fanatic and has kept
detailed records of every statue he has ever created. For every sale, he obtains the customer's
name and address, a description of the statue, and a picture of the statue sold to the
customer. His unique style has recently attracted the attention of several celebrities. Ready to
take his business to the next level, Kai has hired you to construct an accounting information
system, which he wants modeled after his paper records. As you look over his records, you
notice that some customer last names have different first names in different records. For
example, R. Framington Farnsworth, Bob Farnsworth, and Snake Farnsworth all seem to be
the same person. You explain to Kai that every customer must be identified by a unique
customer number in the AIS. You are referring to the
A) entity integrity rule.
B) referential integrity rule.
C) update anomaly.
D) insert anomaly.
Answer: A
Answer: B
250
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: A
1) In a relational database, requiring that every record in a table have a unique identifier is
called the
A) entity integrity rule.
B) referential integrity rule.
C) unique primary key rule.
D) foreign key rule.
Answer: A
2) The database requirement that foreign keys must be null or have a value corresponding to
the value of a primary key in another table is formally called the
A) entity integrity rule.
B) referential integrity rule.
C) unique primary key rule.
D) foreign key rule.
Answer: B
3) In a well-structured database, the constraint that ensures the consistency of the data is
known as the
251
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
4) Identify the statement below that is false with regards to basic requirements of a relational
database model.
A) Primary keys can be null.
B) Foreign keys, if not null, must have values that correspond to the value of a primary key in
another table.
C) All non-key attributes in a table should describe a characteristic about the object identified by
the primary key.
D) Every column in a row must be single-valued.
Answer: A
Answer: C
6) In the database design approach known as normalization, the first assumption made about
data is
A) there is no redundancy in the data.
B) the delete anomaly will not apply since all customer records will be maintained indefinitely.
C) everything is initially stored in one large table.
D) the data will not be maintained in 3NF tables.
Answer: C
7) The database design method in which a designer uses knowledge about business processes
to create a diagram of the elements to be included in the database is called
252
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) normalization.
B) decentralization.
C) geometric data modeling.
D) semantic data modeling.
Answer: D
Answer: D
9) Ama Afolayan is chair of the National Owl Society, which maintains a database of all rare
owls within the United States. One table will store the name, birth date, and other
characteristics of all of the owls that have been registered. Each owl is uniquely identified by a
registration number. A second table will contain data that link each owl to its male and female
parents by means of their registration numbers. The primary key in the first table is
A) name.
B) birth date.
C) the primary key in the second table.
D) a foreign key in the second table.
Answer: D
10) Ama Afolayan is chair of the National Owl Society, which maintains a database of all rare
owls within the United States. One table will store the name, birth date, and other
characteristics of all of the owls that have been registered. Each owl is uniquely identified by a
registration number. A second table will contain data that link each owl to its male and female
parents by means of their registration numbers. The primary key in the second table is
A) name.
B) birth date.
C) the same as the primary key in the first table.
D) a combination of primary keys in the first table.
253
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
11) Ama Afolayan is chair of the National Owl Society, which maintains a database of all rare
owls within the United States. One table will store the name, birth date, and other
characteristics of all of the owls that have been registered. Each owl is uniquely identified by a
registration number. A second table will contain data that link each owl to its male and female
parents by means of their registration numbers. The entities described by the second table
are
A) owls.
B) parental relationships.
C) registration numbers.
D) names.
Answer: B
12) Kekoa Konani is chairman of the Chatty Chihuahua Club, where he maintains a database
of registered purebred Chihuahuas and their breeding history. One table will store the name,
birth date, and other characteristics of all of the registered Chihuahuas. Each Chihuahua is
uniquely identified by a registration number. A second table will contain data that link each
Chihuahua to its male and female parents by means of their registration numbers. The
entities described by the first table are
A) marmosets.
B) parental relationships.
C) registration numbers.
D) names.
Answer: A
13) Kekoa Konani is chairman of the Chatty Chihuahua Club, where he maintains a database
of registered purebred Chihuahuas and their breeding history. One table will store the name,
birth date, and other characteristics of all of the registered Chihuahuas. Each Chihuahua is
uniquely identified by a registration number. A second table will contain data that link each
Chihuahua to its male and female parents by means of their registration numbers. The
primary key in the first table is
A) name.
B) registration number.
254
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) date of birth.
D) relationship number.
Answer: B
14) Kekoa Konani is chairman of the Chatty Chihuahua Club, where he maintains a database
of registered purebred Chihuahuas and their breeding history. One table will store the name,
birth date, and other characteristics of all of the registered Chihuahuas. Each Chihuahua is
uniquely identified by a registration number. A second table will contain data that link each
Chihuahua to its male and female parents by means of their registration numbers. The
primary key in the second table is
A) name.
B) registration number.
C) date of birth.
D) relationship number.
Answer: D
15) Kai Keoni has created custom statues made out of scrap metal for over ten years. He lives
above his shop in Martha's Vinyard, Maryland. Kai is an accounting fanatic and has kept
detailed records of every statue he has ever created. For every sale, he obtains the customer's
name and address, a description of the statue, and a picture of the statue sold to the
customer. His unique style has recently attracted the attention of several celebrities. Ready to
take his business to the next level, Kai has hired you to construct an accounting information
system, which he wants modeled after his paper records. You begin development of the
relational database that will form the core of the AIS by envisioning the record stored in a
single table with a column that represents each attribute. You then begin to break this table
down into smaller tables. This process is called
A) integration.
B) optimization.
C) minimization.
D) normalization.
Answer: D
16) Helen Fume is a recruiter with The Ladders in Nome, Alaska. The Ladders success is largely
attributable to its accounting information system. When a client is hired by an employer,
255
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Helen creates a record that identifies the employment relationship. Helen follows up on
placements by surveying both employers and clients about the employment experience and
then entering the results into the AIS. Clients are uniquely identified by social security
number. In records that contain client survey data, the social security number is likely to be
A) the primary key.
B) a foreign key.
C) combined with other data fields to form a primary key.
D) null.
Answer: B
17) Which of the following would not be one of the well-structured tables in a well-designed
relational database used to generate this sales invoice?
A) Customer Order
B) Customer
C) Sales
D) Sales Order
Answer: A
256
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
18) Which of the following would not be true about the well-structured tables in a well-
designed relational database used to generate this sales invoice?
Answer: A
20) Which of the following elements link rows in one table to rows in another table?
A) primary keys
B) foreign keys
C) semantic keys
257
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) link keys
Answer: B
21) Suppose a relational database contained two linked tables. Which of the following items
is not necessarily present in the database?
A) two primary keys
B) two foreign keys
C) at least one column
D) one foreign key
Answer: B
22) Suppose a relational database contained two linked tables. Assuming the organization
wants the database to be normalized, which of the following items represents a problem to
normalization?
A) The database contains only one primary key.
B) The database contains two foreign keys.
C) The database contains two primary keys.
D) The database contains only one foreign key.
Answer: A
258
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A)
B)
C)
D)
Answer: C
259
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A)
B)
C)
D)
Answer: D
260
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A)
B)
C)
D)
Answer: B
261
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) a primary key.
B) a foreign key.
C) a non-key attribute.
D) an attribute.
Answer: C
5) Using the database depicted below, how many primary keys are in the database?
A) 0
B) 3
C) 4
D) 5
Answer: C
6) Using the database depicted below, how many foreign keys are in the database?
262
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) 0
B) 3
C) 4
D) 5
Answer: B
A) an attribute.
B) a primary key.
C) a foreign key.
D) A, B, and C
Answer: D
263
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) an attribute.
B) a primary key.
C) a foreign key.
D) A, B, and C
Answer: A
9) Using the database depicted below, in the Sales table, "Customer #" is best described as
A) an attribute.
B) a primary key.
C) a foreign key.
D) A, B, and C
Answer: A
264
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) an attribute.
B) a primary key.
C) a foreign key.
D) A, B, and C
Answer: D
A) an attribute.
B) a primary key.
C) a foreign key.
D) A, B, and C
Answer: B
265
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
17.1 Discuss the steps for designing and implementing a database system.
1) Which of the following statements about REA modeling and REA diagrams is false?
A) REA is an acronym for Resources, Entities, and Agents.
266
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) REA data modeling does not include traditional accounting elements such as ledgers, chart of
accounts, debits and credits.
C) REA data modeling could be referred to as an events-based model.
D) REA diagrams must include at least two activities, which together represent a give-get
economic exchange.
Answer: A
2) The REA data model approach facilitates efficient operations by all the following except
A) standardizing source document format.
B) identifying non-value added activities.
C) storing financial and nonfinancial data in the same database.
D) organizing data to simplify data retrieval and analysis.
Answer: A
3) The process of defining a database so that it faithfully represents all aspects of the
organization including its interactions with the external environment is called
A) data modeling.
B) data designing.
C) data development.
D) data definition.
Answer: A
4) In which stage(s) of the database design process does data modeling occur?
A) only in the systems analysis stage
B) only in the design stage
C) in both the systems analysis and design stages
D) neither the systems analysis nor the design stages
Answer: C
5) A(n) ________ diagram graphically depicts a database's contents by showing entities and
relationships.
A) data flow
B) flowchart
267
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) entity-relationship
D) REA
Answer: C
Answer: B
Answer: C
8) An entity-relationship diagram
A) can represent the contents of any database.
B) is only used in conjunction with REA models.
C) can show a limited number of entities and relationships.
D) is used only to design new databases.
Answer: A
268
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
12) In which stage(s) of the database design process is the completed data model used?
A) only in the systems analysis stage
B) only in the conceptual design stage
C) in both the systems analysis and design stages
D) neither the systems analysis nor the design stages
Answer: D
13) In which stage(s) of the database design process should accountants participate?
A) the systems analysis stage
B) the conceptual design stage
C) the implementation and conversion stage
D) in all of the stages above
Answer: D
14) With regards to the database design process, accountants may provide the greatest value
to their organization by participating in
A) implementation and conversion.
B) data modeling.
C) database operation and maintenance.
D) system auditing.
Answer: B
Answer: D
269
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) ovals
C) diamonds
D) There is no industry standard.
Answer: D
Answer: B
2) Which of the following is not one of the rules in creating an REA data model?
A) Each event is linked to at least one resource that it affects.
B) Each event is linked to at least one other event.
C) Each event is linked to at least two participating agents.
D) All of the above are important rules.
Answer: D
Answer: A
4) Relationships that affect the quantity of a resource are sometimes referred to as ________
relationships.
A) commitment
B) exchange
270
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) stockflow
D) duality
Answer: C
Answer: C
Answer: B
Answer: A
9) Identify the item below that would be classified as a resource by the REA data model.
A) an IOU from a customer
B) the CFO
C) a customer sale
D) none of the above
Answer: A
271
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
10) Identify the item below that would be classified as an event by the REA data model.
A) an IOU from a customer
B) the CFO
C) a customer sale
D) none of the above
Answer: C
11) Identify the item below that would be classified as an agent by the REA data model.
A) an IOU from a customer
B) the CFO
C) a customer sale
D) none of the above
Answer: B
12) What is the minimum number of agents that must participate in each REA event?
A) 0
B) 2
C) 1
D) 3
Answer: C
13) What is the minimum number of external agents that must participate in each REA event?
A) 0
B) 2
C) 1
D) 3
Answer: A
14) Assume that you are looking at a REA diagram that depicts only one event. Which of the
following must be on the REA diagram?
A) an external agent
B) an internal agent
C) both A and B
272
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) neither A nor B
Answer: B
Answer: C
16) Identify the notation below that is not used to represent cardinality information.
A) UML
B) (Min, Max)
C) DFD
D) Maximums only
Answer: C
17) Every citizen in the United States has one social security number, but no two citizens have
the same social security number. Thus, the cardinality that exists between social security
numbers and citizens is
A) one-to-one.
B) one-to-many.
C) many-to-many.
D) none of the above
Answer: A
18) Every person in the world has a birthdate, but no person has more than one birthdate.
Thus, the cardinality that exists between birthdate and people is
A) one-to-one.
B) one-to-many.
C) many-to-many.
D) none of the above
273
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
19) Every person in the world can have more than one friend, and each person in the world
can be a friend to more than one person. Thus, the cardinality that exists between friends and
people is
A) one-to-one.
B) one-to-many.
C) many-to-many.
D) none of the above
Answer: C
1) What is the standard cardinality pattern for a relationship between an event and an agent?
A) 1:1
B) 0:1
C) 0:N
D) 1:N
Answer: D
2) An REA diagram must link every event to at least one ________ and two ________.
A) resource; agents
B) agent; resources
C) transaction; entities
D) resource; relationships
Answer: A
3) Each event in an REA model will in most cases have at least one ________ agent and one
________ agent involved with the event.
A) internal; resource
B) external; entity
C) internal; employee
D) internal; external
274
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
4) Which of the following statements is true about the development of an REA model?
A) Events that pertain to the entry of data are included in the REA model.
B) The objective is to model basic value-chain activities.
C) REA diagrams model individual transactions and data collections.
D) Information retrieval events are modeled as events in the REA model.
Answer: B
5) The first step in developing an REA diagram for a specific transaction cycle begins with
identifying
A) relevant events.
B) agents involved.
C) resources affected.
D) relationship cardinalities.
Answer: A
Answer: D
Answer: A
275
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) one or many.
C) zero or many.
D) none of the above
Answer: B
Answer: C
10) Identify the most likely relationship where cardinalities have zero minimums and N
maximums.
A) agent-event relationship
B) resource-event relationship
C) event-event relationship
D) All of the above are equally likely.
Answer: B
Answer: D
12) Which of the following graphical symbols represents a minimum cardinality of zero and a
maximum cardinality of one?
A)
B)
C)
276
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D)
Answer: A
13) Which of the following graphical symbols represents a minimum cardinality of zero and a
maximum cardinality of many?
A)
B)
C)
D)
Answer: C
14) Which of the following graphical symbols represents a minimum cardinality of one and a
maximum cardinality of one?
A)
B)
C)
D)
Answer: B
15) Which of the following graphical symbols represents a minimum cardinality of one and a
maximum cardinality of many?
A)
B)
C)
D)
Answer: D
16) A relationship is diagrammed below using the [Min, Max] notation. Which of the diagrams
below represents the same relationship using the "crow's feet" notation?
277
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A)
B)
C)
D)
Answer: D
17) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Consider Helge's processes regarding the purchasing inventory and supplies, renting display
space, and paying for purchased items. A well-designed REA diagram would
A) include eight unique entities.
B) include nine unique entities.
C) include seven unique entities.
D) include ten unique entities.
Answer: A
18) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
278
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Consider Helge's processes regarding the purchasing inventory and supplies, renting display
space, and paying for purchased items. A well-designed REA diagram would
A) reflect nine 1:N relationships.
B) reflect two M:N relationships.
C) reflect ten 1:N relationships.
D) include two 1:1 relationships.
Answer: A
19) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Consider Helge's processes regarding the purchasing inventory and supplies, renting display
space, and paying for purchased items. A well-designed REA diagram would
279
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) reflect minimum cardinalities of 1 for the relationship between Vendor and Cash
Disbursement entities.
B) reflect the same number of 0 and 1 minimum cardinalities.
C) reflect more maximum cardinalities of M than of 1.
D) reflect maximum cardinalities of M for the relationship between Inventory and Purchase
entities.
Answer: A
20) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Consider Helge's processes regarding the purchasing inventory and supplies, renting display
space, and paying for purchased items. In a well-designed REA diagram, what entities would
reflect economic duality?
A) Purchases and Cash Disbursements
B) Display Space Rental and Cash Disbursements
C) Inventory and Purchases
D) Cash and Cash Disbursements
Answer: A
17.4 Read an REA diagram and explain what it reveals about the business activities and policies
of the organization being modeled.
280
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
Answer: A
Answer: C
281
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
A) a lumber yard where customers may pay with cash for all purchases
B) a buy-here-pay-here auto dealer where a car buyer sends monthly cash payments to the
dealer
C) a consulting firm that offers a variety of consulting services to other businesses
D) a department store that allows customers to carry a balance and to make installment
payments, if they choose
Answer: A
A) a lumber yard where customers may pay with cash for all purchases
B) a buy-here-pay-here auto dealer where a car buyer sends monthly cash payments to the
dealer
C) a consulting firm that offers a variety of consulting services to other businesses
D) a department store that allows customers to carry a balance and to make installment
payments, if they choose
Answer: B
A) a lumber yard where customers may pay with cash for all purchases
282
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) a buy-here-pay-here auto dealer where a car buyer sends monthly cash payments to the
dealer
C) a consulting firm that offers a variety of consulting services to other businesses
D) a department store that allows customers to carry a balance and to make installment
payments, if they choose
Answer: C
A) a lumber yard where customers may pay with cash for all purchases
B) a buy-here-pay-here auto dealer where a car buyer sends monthly cash payments to the
dealer
C) a consulting firm that offers a variety of consulting services to other businesses
D) a department store that allows customers to carry a balance and to make installment
payments, if they choose
Answer: D
A) Vendors send a bill for each inventory item purchased which is payable on receipt.
B) A single purchase of inventory is paid for with multiple payments.
C) Inventory vendors send a monthly bill for merchandise delivered. The seller does not accept
or allow installment payments.
D) Some inventory purchases are paid for with multiple payments and some payments may
apply to multiple purchases.
Answer: B
A) Vendors send a bill for each inventory item purchased which is payable on receipt.
283
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
A) Vendors send a bill for each inventory item purchased which is payable on receipt.
B) A single purchase of inventory is paid for with multiple payments.
C) Inventory vendors send a monthly bill for merchandise delivered. The seller does not accept
or allow installment payments.
D) Some inventory purchases are paid for with multiple payments and some payments may
apply to multiple purchases.
Answer: D
A) Each sale is associated with a single order, and there is a time lag between the time an order
is taken and delivery of the product.
B) Each sale can be comprised of multiple orders, and each order can be associated with
multiple sales or no sales.
C) Each sale can be comprised of multiple orders, and each order can be associated with one or
more multiple sales.
D) Each sale is associated with a single order and, there is no time lag between the time an
order is taken and delivery of the product.
Answer: A
284
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Each sale is associated with a single order, and there is a time lag between the time an order
is taken and delivery of the product.
B) Each sale can be comprised of multiple orders, and each order can be associated with
multiple sales or no sales.
C) Each sale can be comprised of multiple orders, and each order can be associated with one or
more sales.
D) Each sale is associated with a single order, and there is no time lag between the time an
order is taken and delivery of the product.
Answer: B
A) Each sale is associated with a single order, and there is a time lag between the time an order
is taken and delivery of the product.
B) Each sale can be comprised of multiple orders, and each order can be associated with
multiple sales or no sales.
C) Each sale can be comprised of multiple orders, and each order can be associated with one or
more sales.
D) Each sale is associated with a single order, and there is no time lag between the time an
order is taken and delivery of the product.
Answer: C
A) Each sale is associated with a single order, and there is a time lag between the time an order
is taken and delivery of the product.
B) Each sale can be comprised of multiple orders, and each order can be associated with
multiple sales or no sales.
C) Each sale can be comprised of multiple orders, and each order can be associated with one or
more sales.
285
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) Each sale is associated with a single order, and there is no time lag between the time an
order is taken and delivery of the product.
Answer: D
18.1 Integrate separate REA diagrams for individual business cycles into a single,
comprehensive organization-wide REA diagram.
286
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1) Integrating separate REA diagrams developed for individual transaction cycles into a single,
comprehensive enterprise-wide data model
A) is possible.
B) requires understanding what the cardinalities in each separate diagram reveal about the
organization's business policies and activities.
C) provides a single comprehensive enterprise-wide model of the organization.
D) All of the above are true.
Answer: D
2) An integrated REA diagram merges multiple copies of ________ and ________ entities but
retains multiple copies of ________ entities.
A) resource; event; agent
B) event; agent; resource
C) resource; agent; event
D) None of the above. An integrated REA diagram merges multiple copies of all entities.
Answer: A
Answer: A
Answer: B
287
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5) Combining REA diagrams for individual transaction cycles into a single, enterprise-wide
model adds two more rules to the three basic principles for drawing REA diagrams. Which of
the following is not one of those two new rules?
A) Every resource must be linked to at least one event that increments that resource and to at
least one event that decrements that resource.
B) If a specific event can be linked to more than one other type of event, but cannot be linked
simultaneously to all of those other events, then the minimum cardinality between that event
and every other event with which it may be associated must be 0.
C) If a specific event can be linked to more than one other type of event, but cannot be linked
simultaneously to all of those other events, then the maximum cardinality between that event
and every other event with which it may be associated must be 0.
D) All of the above are new rules for drawing integrated REA diagrams.
Answer: C
6) Which of the following statements is not true with regards to a correctly drawn enterprise-
wide REA diagram?
A) Every event must be linked to at least one resource.
B) Merging two transaction cycles on a common event may affect the minimum cardinalities
between the merged event and the other events.
C) Events can only be merged if they share the same resources and events.
D) Creating a set of tables from an REA diagram automatically results in a well-structured
relational database.
Answer: C
7) Which of the below statements is false with respect to REA diagrams for individual
transaction cycles?
A) They depict basic give-to-get economic duality relationships.
B) They usually provide only a partial view of resources.
C) They need to be combined in order to provide a comprehensive enterprise-wide data model.
D) They show both how resources are acquired and how they are used.
Answer: D
8) Which of the statements below is false with respect to enterprise-wide REA diagrams?
288
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) Merging two or more REA diagrams that contain the same resource entity does not require
any changes to the cardinality pairs in the individual diagrams.
B) Merging two or more diagrams that contain a common event entity, however, often requires
changing the minimum cardinalities associated with the other events to 0, to reflect the fact
that the merged event may be connected to any one of several different events, but not to all of
them simultaneously.
C) The minimum cardinalities associated with agents may also have to be changed to 0.
D) All of the above are true.
Answer: D
9) When combining two REA diagrams by merging common entities, changes in the cardinality
of the merged entity is needed when it is a(n)
A) agent.
B) event.
C) relationship.
D) resource.
Answer: B
10) Integrating separate REA diagrams into a single comprehensive enterprise-wide model of
the organization requires understanding what the ________ in each separate diagram reveal
about the organization's business policies and activities.
A) cardinalities
B) data
C) events
D) transactions
Answer: A
Answer: A
289
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
12) Which entity is most likely to be part of both the revenue cycle and the expenditure cycle?
A) Receive Goods
B) Customer
C) Receive Cash
D) Inventory
Answer: D
13) Which entity is most likely to be part of both the payroll cycle and the expenditure cycle?
A) Receive Goods
B) Customer
C) Disburse Cash
D) Inventory
Answer: C
14) Which entity is most likely to be part of both the payroll cycle and the revenue cycle?
A) Cash
B) Customer
C) Receive Goods
D) Inventory
Answer: A
15) Which entity is most likely to be part of the payroll cycle, expenditure cycle, and the
revenue cycle?
A) Customer
B) Cash
C) Supplier
D) Inventory
Answer: B
16) Which of the following is a redundant entity that would be merged when two cycles are
combined?
A) Customer
290
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) Employee
C) Vendor
D) Inventory
Answer: D
Answer: B
Answer: A
Answer: C
21) When integrating multiple REA diagrams into an integrated REA diagram, merging
redundant resources
A) always affects minimum cardinalities associated with the merged event.
B) sometimes affects minimum cardinalities associated with the merged event.
C) never affects minimum cardinalities associated with the merged event.
D) none of the above
291
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: A
23) When integrating multiple REA diagrams into an integrated REA diagram, to merge an
event that appears in both business cycle REA diagrams,
A) the event that appears in both business cycle REA diagrams may be linked to either an event
that is part of one business cycle or to an event that is part of another business cycle.
B) the event that appears in both business cycle REA diagrams may be linked to an event that is
part of one business cycle and to an event that is part of another business cycle.
C) One cannot merge an event that appears in both business cycles.
D) none of the above
Answer: A
18.2 Build a set of tables to implement an REA model of an AIS in a relational database.
1) The primary key for a Purchase-Inventory table that consists of the Purchase Order Number
and the Inventory Item Number, is known as a
A) concatenated key.
B) foreign key
C) primary key.
D) dual key.
Answer: A
292
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: A
4) Which of the following is not one of the steps in implementing an REA diagram in a
relational database?
A) Implement many-to-many relationships with foreign keys.
B) Create tables for entities.
C) Assign attributes to tables and identify primary keys.
D) Implement one-to-many relationships with foreign keys.
Answer: A
5) Which of the following is not one of the three steps to implementing an REA diagram in a
relational database?
A) Assign attributes to appropriate tables.
B) Create a table for each distinct entity in the diagram and for each many-to-many relationship.
C) Link every event to at least one resource.
D) Use foreign keys to implement one-to-one and one-to-many relationships.
Answer: C
6) Why might the same REA diagram result in different relationship cardinalities?
A) Different organizations might have different business policies.
B) Different designers might implement an REA diagram differently.
C) Different consultants might draw an REA diagram differently.
D) Errors occur in the REA diagram.
Answer: A
293
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
8) Which of the following is true with regards to REA diagrams and relational databases?
A) A well-designed relational database is the starting point for creating an REA diagram.
B) A well-designed REA diagram minimizes update, insert or delete anomaly problem when the
diagram is implemented into a relational database.
C) REA diagrams and database design are generic across organizations.
D) The design of a relational database is specific to the organization being modeled.
Answer: D
9) Which of the following is false with regards to creating database tables from an REA
diagram?
A) A properly designed relational database has a table for each distinct entity in an REA diagram.
B) A properly designed relational database has a table for each many-to-many relationship in an
REA diagram.
C) To reduce confusion, table names should not duplicate REA diagram entities' names.
D) Many-to-many relationships will be shown in tables with hyphenated concatenations of the
entities' names.
Answer: C
294
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: B
Answer: C
13) Which of the statements below is false with regards to the tables for M:N relationships?
A) Non-key attributes may be included.
B) Multiple attribute primary keys are used.
C) Single attribute primary keys may be used.
D) Concatenated keys are used.
Answer: C
14) Which of the statements below is false with regards to creating database tables from an
REA diagram?
A) M:N relationships must be implemented as separate tables.
B) 1:N relationships are implemented with the primary key of the 1 side becoming a foreign key
on the N side.
C) 1:1 relationships are implemented with the primary key of either entity included as a foreign
key in the table representing the other entity.
D) All of the above are true.
Answer: D
295
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
15) Which of the following is not part of a "final accuracy check" when creating relational
tables from an REA diagram?
A) Every attribute in every table is single-valued (i.e., each table is a flat file).
B) Every event must be linked to at least one resource.
C) Every table must have a primary key.
D) Other non-key attributes in each table must be either a fact about the thing designated by
the primary key or foreign keys used to link that table to another table.
Answer: B
Answer: D
17) How many tables are needed to implement an REA data model that has six distinct
entities, three M:N relationships and four 1:N relationships in a relational database?
A) 6
B) 9
C) 11
D) 13
Answer: B
18) How many tables are needed to implement an REA data model that has five distinct
entities, two M:N relationships and three 1:N relationships in a relational database?
A) 5
B) 7
C) 8
D) 10
Answer: B
296
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
20) In which of the following cases is the number of tables required to represent the
relationship equal to three?
A)
B)
C)
D)
Answer: D
21) In which of the following cases is the relationship between entities not implemented by
foreign keys?
A)
B)
C)
D)
Answer: D
297
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
22) Which of the following attributes would typically be included in the table that stores data
about the Customer entity in a relational database?
A) Invoice number
B) Credit limit
C) Product code
D) Backorder
Answer: B
23) In a relational database, which of the following attributes would typically be included in
the table that stores data about the Vendor entity?
A) Invoice number
B) Outstanding balance
C) Product code
D) Inventory
Answer: B
24) In a relational database, which of the following attributes would typically be represented
by a foreign key in the table that stores data about a Receive Inventory entity?
A) Purchase order number
B) Payment terms
C) Product code
D) Date
Answer: A
25) In a relational database, which of the following attributes would typically be represented
by a foreign key in the table that stores data about a Disburse Cash entity?
A) Amount
B) Date
C) Vendor number
D) Product number
Answer: C
298
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
26) Implementation of this REA diagram into a relational database would require how many
tables?
A) 12
B) 13
C) 8
D) 9
Answer: B
27) Which of the following would be true when implementing this REA diagram into a
relational database?
299
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A) The primary key for Employee would be a foreign key for Cash Receipts.
B) The primary key for Cash Receipts would be a foreign key for Cash.
C) The primary key for Parts would be a foreign key for Service Request.
D) The primary key for Sales would be a foreign key for Service Request.
Answer: A
28) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
300
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) date of purchase
D) total amount of purchase
Answer: A
29) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Answer: A
30) Helge Autoparts sells new and refurbished auto parts exclusively to auto dealers. Helge
purchases inventory from distributors at trade conventions. Each time Helge makes a
purchase, the company records the suppliers name, address, date, specific items purchased,
price paid for each, and the total amount spent. Helge later researches the inventory items to
set the customer price. The company assigns an inventory number to each item purchased
and records the customer price for each item. Helge buys price tags and display supplies from
Alwin Incorporated, a company that sells them at all trade conventions. All inventory and
supplies purchases are immediately paid for with cash or with checks from a bank account in
Helge's name. All cash received from sales are also deposited to the same bank account.
Several times a year Helge rents display space at dealer conventions. A deposit is always
301
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
required, and the entire fee is due the day the convention starts. Helge records the deposit
and final payment, along with the convention's name and address, in the same worksheet on
which purchases of inventory and supplies are recorded.
Which of the following would be an attribute in the table for Display Space Rental?
A) Convention name
B) Deposit paid
C) Balance paid
D) Convention address
Answer: A
Answer: D
33) How many tables are needed to implement an REA data model that has four distinct
entities, three M:N relationships and one 1:N relationships in a relational database?
A) 5
B) 7
C) 8
D) 10
Answer: B
34) How many tables are needed to implement an REA data model that has three distinct
entities, two M:N relationships and two 1:N relationships in a relational database?
A) 5
B) 7
C) 8
D) 10
302
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
35) Identify the attribute below that would not make a good primary key.
A) birthdate
B) social security number
C) a unique number automatically generated by the system
D) cell phone number
Answer: A
36) From the choices below, identify the attribute below that would make the best primary
key.
A) height (in inches)
B) date of first purchase
C) zip code
D) customer telephone number
Answer: D
37) Rebus Fashions provides haircuts to men and women. Rebus uses an REA database to
record information that is important to the firm. Rebus has a table named "Employee" where
it keeps information about its hair stylists. Identify the attribute below that most likely does
not belong in the Employee table.
A) Stylist phone number
B) Stylist hair cut specialties
C) Number of haircuts provided by a stylist on a given day
D) All of the above are appropriate attributes for the Employee table.
Answer: C
38) Rebus Fashions provides haircuts to men and women. Rebus uses an REA database to
record information that is important to the firm. Rebus has a table named "Customer" where
it keeps information about its customers. Identify the attribute below that most likely does
not belong in the Customer table.
A) Customer hair color
B) Customer hair style
C) Customer address
303
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) All of the above are appropriate attributes for the Customer table.
Answer: D
39) Rebus Fashions provides haircuts to men and women. Rebus uses an REA database to
record information that is important to the firm. Rebus has an M:N table named "Customer-
Sale" where it keeps information about customer sales. Identify the attribute below that most
likely does not belong in the Customer-Sale table.
A) Date of sale
B) Time hair cut was started
C) Name of customer
D) All of the above are appropriate attributes for the Customer table.
Answer: C
40) Rebus Fashions provides haircuts to men and women. Rebus charges $10 per haircut, no
matter what type of haircut the customer selects. Rebus uses an REA database to record
information that is important to the firm. Rebus has an M:N table named "Customer-Sale"
where it keeps information about customer sales. Identify the attribute below that most likely
does not belong in the Customer-Sale table.
A) Date of sale
B) Time hair cut was finished
C) Price of haircut
D) All of the above are appropriate attributes for the Customer table.
Answer: C
18.3 Explain how to write queries to retrieve information from an AIS relational database built
according to the REA data model.
Answer: D
304
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
2) When comparing REA diagrams used to design an AIS with a traditionally designed AIS,
A) traditional AIS information, such as journals and ledgers no longer exist.
B) similar information is present as in a traditional AIS, but stored in a different format.
C) queries are used to input data into the AIS.
D) an REA designed AIS cannot recreate a traditional journal.
Answer: B
3) Which of the following is/are true with regards to using REA diagrams to retrieve
information from a database?
A) Although neither journals nor ledgers appear explicitly in an REA diagram, each can be
created through appropriate queries.
B) The information normally found in a journal is contained in the tables used to record data
about events.
C) Much of the information about an organization's assets that is traditionally recorded in
ledgers is stored in resource tables in an REA-based relational database.
D) All of the above
Answer: D
Answer: D
305
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
Answer: B
7) Because information about temporal imbalances between two ________, such as accounts
receivable and accounts payable, is needed so frequently, such calculated values are
sometimes stored as ________ in the appropriate tables.
A) events; agents
B) events; attributes
C) resources; agents
D) resources; attributes
Answer: B
8) Which of the statements below is false with regards to generating financial statements
from an REA-based relational database?
A) It is possible to use a completed REA diagram to guide the writing of queries to produce the
information that would be included in financial statements.
B) Many financial statement items can be displayed by querying a single table.
C) It is unnecessary to understand the REA data model to know which tables need to be
included in each query to generate the correct answers to financial statement questions.
D) A major advantage of the REA data model is that it integrates non-financial and financial
data.
Answer: C
9) Which of the statements below is false when comparing the REA model to the traditional
AIS model?
A) Traditional AISs contain only data about the financial aspects of transactions.
306
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) A major advantage of the REA data model is that it integrates non-financial and financial data
in the AIS and makes both types of data easily accessible to management.
C) In the REA model, many financial statement items can be displayed by querying a single
table.
D) Accounts in the traditional AIS are analogous to resources in the REA-based relational
database.
Answer: D
10) The major benefits of using the REA model as the basis for designing an AIS include all of
the following except
A) the REA data model integrates non-financial and financial data in the AIS.
B) the REA data model makes both non-financial and financial data easily accessible to
management.
C) the REA data model provides the basis for building the kind of flexible AIS that is responsive
to management's changing information needs.
D) the REA data model reduces the need for accountants to understand the underlying
accounting journals and ledgers.
Answer: D
Answer: A
12) A query that extracts, for a given time period, the total amount of all sales events for
which there is no corresponding receive cash event will yield
A) a cash account ledger.
B) a credit sales journal.
C) an accounts receivable ledger.
D) an accounts payable journal.
Answer: C
307
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
13) A query that extracts, for a given time period, all sales events for which there is no
corresponding receive cash event on the date of the sales event will yield
A) a cash account ledger.
B) a credit sales journal.
C) an accounts receivable ledger.
D) an accounts payable journal.
Answer: B
14) A query that extracts, for a given time period, all purchases for which there is no
corresponding disburse cash event will yield
A) a cash account ledger.
B) a credit sales journal.
C) an accounts receivable ledger.
D) an accounts payable journal.
Answer: D
18) Which of the following elements found in a traditional AIS system are not represented as
entities in an REA relational database, but rather must be retrieved through the use of
queries?
A) accounts receivable
B) the general ledger
C) accounts payable
D) all of the above
Answer: D
19) In a relational database designed according to the REA model, where is information about
transactions stored?
A) Resource entities
B) Agent entities
C) Event entities
D) all of the above
Answer: C
308
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
20) In a relational database designed according to the REA model, where is information about
an organization's liabilities generally stored?
A) Resource entities
B) Agent entities
C) Event entities
D) All of the above
Answer: A
21) In a relational database designed according to the REA model, where is information about
accounts receivable stored?
A) Event entities
B) Agent entities
C) Both A and B
D) None of the above
Answer: C
309
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
19.1 Develop REA data models for a variety of organizations besides retail stores.
1) Explicitly identifying the different employees who participate in each event by their job
functions is helpful when verifying
A) internal controls.
B) job descriptions.
C) proper supervision.
D) segregation of duties.
Answer: D
2) Many companies sell software, music, or digital photographs over the Internet. They
provide each customer with a digital copy of those resources, but not the actual resource
itself. How will this company's REA model differ from those selling tangible inventory?
A) These companies do not need an Inventory table.
B) The structure of Inventory table is completely different from that of mass-produced
merchandise.
C) The Inventory table is only different in that it doesn't need attributes such as quantity-on-
hand, quantity-available, reorder point, and standard reorder quantity.
D) The Inventory table need not include information about the standard list price of each item
and its description.
Answer: C
3) Sales order number is most likely to be a foreign key in which entity of an expanded
revenue cycle REA diagram?
A) Call on Customers
B) Fill Customer Order
C) Ship Order
D) Take Customer Order
Answer: B
310
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
4) Sales order number is most likely to be a primary key in which entity of an expanded
revenue cycle REA diagram?
A) Call on Customers
B) Fill Customer Order
C) Ship Order
D) Take Customer Order
Answer: D
Answer: B
6) Picking ticket number is most likely to be a primary key in which entity of an expanded
revenue cycle REA diagram?
A) Call on Customers
B) Fill Customer Order
C) Ship Order
D) Take Customer Order
Answer: B
7) Picking ticket number is most likely to be a foreign key in which entity of an expanded
revenue cycle REA diagram?
A) Customers
B) Fill Customer Order
C) Ship Order
D) Take Customer Order
Answer: C
311
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: B
9) Concerning the relationship from the Rent Item to the Receive Cash events: The minimum
cardinality is ________ because customers typically pay first, prior to taking possession of the
item. The maximum cardinality is ________ because there may be additional charges imposed
when the item is returned.
A) 0; 1
B) 1; 1
C) 1; N
D) N; M
Answer: C
10) The relationship between the Rent Item and Return Item events is most likely 1:1 for all
except which of the following reasons?
A) A return must be for a rented item.
B) A rented item can only be returned once.
C) Rented items are accounted for separately.
D) All rented items must be returned.
Answer: D
11) In an expenditure cycle diagram, which of the following is an example of an event that
larger organizations might want to include in their extended REA model?
A) Request
B) Order
C) Ship Order
D) Fill Order
Answer: A
12) Using an REA database design, which of the below is false with regards to cost data?
312
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
13) Using an REA database design, which is the most likely primary key for the Inventory–
Request_Goods table?
A) Product number
B) Product number - Purchase order number
C) Product number - Purchase requisition number
D) Purchase requisition number
Answer: C
14) Using an REA database design, which is the most likely primary key for the Pay for Goods
table?
A) Cash transaction number
B) Check number
C) Invoice number
D) Receiving report number, check number
Answer: B
15) For a service business, the minimum cardinalities between Sales event and Inventory
entity are most likely both 0 for all except which of the following reasons?
A) Service businesses don't sell inventory, they only use inventory to perform services.
B) A sale doesn't have to include any inventory.
C) Inventory can exist that hasn't been part of a sale yet.
D) Some services only require labor.
Answer: A
313
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
16) The minimum cardinality from the Sales event to the Services entity is most likely 1
because
A) every sale includes performing a service.
B) a service is only recorded once a sale has occurred.
C) only 1 service is provided for each sale.
D) The minimum cardinality would not be 1; it would most likely be 0.
Answer: A
17) A dental office would likely model the relationships between the Sales event and both the
Services and Supplies Resource entities as
A) M:N.
B) 1:1.
C) 1:N.
D) 0:1.
Answer: A
18) In a relational database, details about activities such as Cleaning, X-Rays, Fillings, Root
Canals, Crowns, and Extractions would all be stored in which table?
A) Services
B) Sales
C) Inventory
D) Those activities would be stored as part of a relationship, not a table.
Answer: A
Answer: B
314
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
20) The minimum cardinalities between a location, such as Warehouse, and a resource, like
Inventory, will likely be 0 for all except which of the following reasons?
A) One specific inventory item could be stored at several different warehouses.
B) A warehouse could be currently empty.
C) Not all kinds of inventory are stored at each warehouse.
D) Inventory could include products not yet available for sale.
Answer: A
21) Since the same inventory items may be stored in several different warehouses, the
maximum cardinality from Inventory to Warehouse is most likely
A) 0.
B) N.
C) 1.
D) determined by the number of warehouses compared to the number of inventory items.
Answer: B
22) Relationships between resources and agents, such as Inventory and Supplier, reflect the
best practice of identifying preferred and alternative suppliers for specific inventory items.
Similar relationships between resources and employees can be used to model ________ and
________.
A) cost; revenue
B) performance; behavior
C) responsibility; accountability
D) segregation of duties; internal control
Answer: C
Answer: C
315
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: A
26) The cardinality pair from the Financial Institution entity to the Cash resource has a
________ minimum and an ________ maximum because companies will probably only keep
information about financial institutions with which they have accounts but may have more
than one account at the same financial institution.
A) 0; N
B) 0; 1
C) 1; N
D) M; N
Answer: C
Answer: B
28) The temporal difference between Request Inventory and Order Inventory is reflected by
the
316
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
Answer: A
30) Which of the following diagrams represents a situation where a firm offers some services
that have not ever been sold, offers other services that have been performed many times, and
provides services sometimes performed together to clients?
A)
B)
C)
D)
Answer: D
31) Which of the following diagrams represents a situation where a business that rents lawn
mowers (not all of which get rented) writes separate rental agreements for each mower, so
renters don't have to return all the rented items at the same time?
A)
317
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B)
C)
D)
Answer: D
32) Which of the following diagrams represents a situation where items rented by a customer
must be returned intact, and several rented items could be returned at the same time?
A)
B)
C)
D)
Answer: B
33) Which of the following diagrams represents a situation where deliveries are frequently
made to the specific warehouse where the delivered goods will be stored?
A)
B)
C)
D)
Answer: B
318
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
34) Which of the following diagrams represents a situation where one or more warehouses
may be empty, and production of new products has been delayed due to difficulty obtaining
materials?
A)
B)
C)
D)
Answer: A
35) Which of the following diagrams represents the cardinality pairs in a situation where
goods don't have to be requisitioned, but if they are, requisitions are approved and processed
before purchase orders are issued?
A)
B)
C)
D)
Answer: D
36) Which of the following diagrams represents the cardinality pairs in a situation where
customer orders are individually filled, but not all the items on a customer order are always
available?
A)
319
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B)
C)
D)
Answer: B
40) Identify the business activity below that cannot be modeled using an REA diagram.
A) purchase requisitions
B) rental transactions
C) intangible assets
D) All of the above can be modeled by an REA diagram.
Answer: D
41) In which entity would an item's standard cost information most likely be maintained?
A) Inventory entity
B) Order_Inventory entity
C) Inventory-Order_Inventory entity
D) none of the above
Answer: A
42) In which entity would an item's actual cost information most likely be maintained?
A) Inventory entity
B) Order_Inventory entity
C) Inventory-Order_Inventory entity
D) none of the above
Answer: C
320
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
43) Identify the inventory valuation method below that cannot be calculated in a database
created using an REA modeling approach.
A) LIFO
B) FIFO
C) Weighted Average
D) none of the above
Answer: D
44) If the actual cost of an inventory item is maintained as an attribute in the Inventory table,
which inventory valuation method would an organization have to use?
A) LIFO
B) FIFO
C) Weighted Average
D) Specific Identification
Answer: C
46) Assume an organization sells digital photographs to customers through its website (the
company only sells photographs in digital format, it does not provide a physical copy of any
photograph). Identify the attribute below that the organization would not need in its
Inventory entity.
A) reorder point
B) price
C) photograph description
D) primary key
Answer: A
47) In addition to modeling Resources, Events, and Agents, identify the two additional
concepts an organization will need to incorporate if it wishes to extend the REA to include
information about firm policies.
A) Type and Rules
B) Rules and Group
C) Group and Rules
D) None of the above
321
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: C
Answer: A
Answer: B
50) Type and group entities are similar in that both are abstractions that represent sets of
A) objects.
B) semantics.
C) attributes.
D) all of the above
Answer: A
51) The attributes of which type of entity would provide a way for the system to compare an
employee's reimbursement request with the permissible range of the amount of
reimbursement permitted?
A) Resources
B) Events
C) Agents
D) Type
Answer: D
322
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
52) The textbook explicitly identifies ________ as situation where a properly designed
database can yield tax benefits.
A) meal and entertainment expenses
B) salary expenses
C) travel expenses
D) depreciation expenses
Answer: A
19.2 Develop REA data models for the HR/payroll, manufacturing, and capital assets business
cycles.
1) Identify the entity linked to almost every other entity in an REA diagram for HRM/payroll
cycles.
A) Employee
B) Job title
C) Payroll
D) Worker I.D.
Answer: A
Answer: A
3) Identify the entity that stores most of the data typically found in the employee master file.
A) Time Worked
B) Employee
C) HR
323
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D) Payroll
Answer: B
4) In an REA diagram for the HR/Payroll cycle, the relationship between Employees and
Training is typically M:N for all except which of the following reasons?
A) One employee may attend the same training event more than once.
B) Each employee may attend more than one training event.
C) Each training event may have more than one employee attend.
D) One training event may be offered more than once.
Answer: A
5) In an REA diagrram for the HR/Payroll cycle, the ________ relationship between Skills and
Recruiting reflects the fact that one specific advertisement may list several specific skills and,
over time, there may be several advertisements for one specific skill.
A) 1:1
B) 1:N
C) M:N
D) 0:N
Answer: C
6) The Interview event stores detailed data about each job interview. Since hiring only
happens once, but there may have been several interviews, Interview is linked to the Hire
Employees event in a(n) ________ relationship.
A) 1:N
B) 1:1
C) M:N
D) 0:N
Answer: A
7) When modeling the issuance of debt, the maximum cardinality from Disburse Cash to Issue
Debt is 1 because
A) interest is usually only paid at the maturity date.
B) one check is written for the total interest due.
324
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C) The Issue Debt event is not related to Disburse Cash event; cash is received, not given.
D) The minimum cardinality would be 1, but the maximum cardinality should be N.
Answer: B
8) The relationship between the Disburse Cash and Issue Stock events is modeled as being
M:N for all except which of the following reasons?
A) One dividend check could be paid to shareholders that purchased stock at different times.
B) Shareholders could receive several dividend checks over time.
C) Checks must be written to each shareholder for dividend payments.
D) Stock can be issued more than once over a period of time.
Answer: C
9) The relationship between the Acquire Services and Disburse Cash events is modeled as
________ to reflect the common situation in which the organization obtains the use of a
specific service for a particular period of time and makes a payment each month for the
services it acquired and used that month.
A) 1:1
B) 1:N
C) M:N
D) none of the above
Answer: A
10) While not required, connecting the Time Used entity to specific business events enables
A) evaluating performance at a very detailed level.
B) general performance evaluation.
C) evaluating the quality of the services received.
D) determining productivity of employees, such as how many customer calls were made, or how
many sales were made.
Answer: A
11) An REA diagram for the production cycle models the relationships between the Perform
Job Operations event and the Job Operations List entity as 1:N because
A) time standards change over time.
325
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B) one specific activity has only one standard time for completion.
C) activities are only performed once on work in process jobs.
D) many activities are usually required for specific work in process jobs.
Answer: B
12) Data about actual raw materials used in production is most appropriately stored which of
the entities below?
A) Finished Goods
B) Raw Materials
C) Raw Materials Issuance
D) Work-in-Process
Answer: C
13) The ________ entity is used to collect and summarize data about the raw materials, labor,
and machine operations used during production of inventory.
A) Finished Goods Inventory
B) Raw Materials
C) Issue Raw Materials
D) Work-in-Process
Answer: D
14) In the table called Perform Machine Operations, which is the most likely primary key?
A) Equipment Number
B) Job Operation Number
C) Machine Operation Number
D) Machine Operations List Number
Answer: C
326
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: A
16) Which of the following is not one of the four main events in a typical production cycle REA
diagram?
A) issuance of raw materials
B) order raw materials
C) use of labor in production
D) use of machinery and equipment in production
Answer: B
17) Which of the following diagrams represents the cardinality pairs for a typical, hierarchical
organization?
A)
B)
C)
D)
Answer: B
18) Which of the following diagrams represents the cardinality pairs for a repair shop where
supervisors place items that need repair in a common area where any available employee can
work on the item? Naturally, employees are always repairing more than one item at a time,
and more than one supervisor can drop off items that need repair.
A)
B)
C)
327
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
D)
Answer: D
19) Which of the following diagrams represents the cardinality pairs in a situation where a
specific skill is taught at training sessions, but training is not offered for all skills at each
session?
A)
B)
C)
D)
Answer: A
20) Which of the following accurately represents typical cardinalities for two entities in the
finance cycle?
A)
B)
C)
D)
Answer: C
21) Which of the following accurately represents typical cardinalities for two entities in the
finance cycle?
328
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
A)
B)
C)
D)
Answer: D
22) Which of the following represents the cardinality pairs in a situation where a finished
product requires one or more machine operations, and machines usage is tracked by specific
production run(s)?
A)
B)
C)
D)
Answer: D
23) Which of the following diagrams represents the cardinality pairs in a situation where a
finished product requires one or more labor operations, and labor usage is recorded to
specific production runs?
A)
329
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B)
C)
D)
Answer: B
24) Which of the following diagrams represents the cardinality pairs in a situation where a
specific production run results in a specific finished good, and a specific finished good is
produced periodically?
A)
B)
C)
D)
Answer: C
25) Which of the following accurately represents typical cardinalities for two entities in the
production cycle?
A)
330
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
B)
C)
D)
Answer: A
26) Which of the following accurately represents typical cardinalities for two entities in the
HR/Payroll cycle?
A)
B)
C)
D)
Answer: C
27) Which of the following diagrams represents the cardinality pairs in a situation where
interviews are conducted individually, and job applicants are able to interview for one or
more positions?
A)
B)
C)
D)
331
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
28) Which of the following diagrams represents the cardinality pairs in a situation where
many people apply for a specific position, and some of the applicants have applied for the
position in the past?
A)
B)
C)
D)
Answer: B
29) Which of the following diagrams represents the cardinality pairs in a situation where
supervisors conduct individual performance evaluations with each of the employees they
supervise?
A)
B)
C)
D)
Answer: A
34) Where are depreciation expenses recorded in a database created using an REA modeling
approach?
A) as a resource
B) as an event
C) as an agent
332
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Answer: D
35) In which entity would information about depreciation formula(s) and assumption(s) be
stored in an REA model?
A) Resource
B) Event
C) Agent
D) Both A and B
Answer: A
36) In an REA database model, the Bill of Materials entity contains information about what?
A) the raw materials used to make a finished product
B) the actual cost of the raw materials used to make a finished product
C) the vendor from whom the raw materials was purchased
D) all of the above
Answer: A
37) In a database created using an REA model, the Bill of Materials entity is most analogous to
A) the "bill" that can be sent to the customer who order the finished good(s).
B) the "recipe" needed to produce the finished good(s).
C) the "receipt" for the purchase of specific raw materials.
D) the "audit trail" that can be used to verify a finished good(s) was actually produced.
Answer: B
38) Identify the event below where information associated with the event most likely will
need to be retained for years.
A) the actual cost associated with repairing a customer's car
B) the employee who answered a customer service phone call
C) the amount of cash received from issuing stock
D) a list of services offered by the company as of the start of a fiscal year
Answer: C
333
Downloaded
Downloadedby:
by:clintonson
hasannaji95
| wamalwamayeku@gmail.com
| hasannaji95@yahoo.com
Distribution of this document is illegal
Powered by TCPDF (www.tcpdf.org)