ACC 3202 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

When management designs and implements effective administrative processes:

A budgeting process is a method of corporate governance.

Within ERP systems:

A single user with a password may be authorized to purchase and receive the item.

In addition to fraud, there are many kinds of unethical behaviors related to computers. Which of the following is one of those behaviors?

All of the above

The risk of an unauthorized user gaining access is likely to be a risk for which of the following areas?

All of the above

There are number of advantages to cloud computing. Which of the following is one of those advanatges?

All of the above

Unchecked risks and threats to the IT system could result in:

All of the above

Automatic integrated backup means:

All of the above are correct.

Structured data:

All of the above are true of structured data

A bank would consider which of the following as nonprivate information? A. Customer name. B. Customer address if the customer is a business.

All of the above, A, B, and C, are private and privileged types of information.

B2C e-commerce requires:

Access to the Internet.

Bank reconciliation tasks include:

Both of the above

The main reasons that it is necessary to study information-based processing and the related audit function include:

Both of the above.

The common element in B2B and B2C is:

Both require access to the business's website.

Select the true statement from those given below.

Both the capital process and the investment process require top management approval.

When absorption costing is used:

Both variable and fixed costs are included in unit costs.

The purposeful and organized changing of business processes to make the processes more efficient is known as:

Business process reengineering

Production orders:

Authorize production activities for a particular need or order.

After the accounting information has been input into the accounting system, it must be processed. Process accounting data involves:

Calculations, classification, and summarization

This phase of the fixed asset processes relates to those required to maintain accurate and up-to- data records regarding all fixed assets throughout their useful lives.

Continuance

An elaborate system of checks and balances, whereby a company's leadership is held accountable for building shareholder value and creating confidence in the financial reporting processes, is referred to as:

Corporate governance

Factors which adversely affect the implementation of an ERP system do NOT include:

Cost

In order to have the segregation of duties recommended by COSO, it would be necessary for a small organization to hire two additional individuals. At this time, there is not enough work for the one office employee to stay busy. The reason for not hiring the additional people would have to do with:

Cost versus benefit

The maximum dollar amount that a customer is allowed to carry as an accounts receivable balance:

Credit Limit

When two or more people work together to commit a fraud, it is called:

Collusion

Segregation of duties is a fundamental concept in an effective system of internal controls. Nevertheless, the effectiveness of this control can be compromised through which situation?

Collusion among employees

A record pointer is a:

Column value that points to the next address with the linked attribute.

A field is a:

Column within a record.

This type of audit is completed in order to determine whether a company has adhered to the regulations and policies established by contractual agreements, governmental agencies, or some other high authority.

Compliance Audit

To employ analytical processes on the organization's data:

Data mining is performed on the data warehouse.

The procedures to collect and prepare source documents are termed:

Data preparation procedures

A collection of several years' nonvolatile data used to support strategic decision-making is a (n)

Data warehouse.

A collection of data stored on a computer in a form that allows the data to be easily accessed, retrieved, manipulated, and stored is referred to as a(n):

Database

The security of assets and documents would include all of the following, except:

Designated members of management should be assigned responsibility for the disposal of any assets

Which of the following is a correct statement related to segregation of duties related to fixed assets?

Custody of fixed assets is to be separate from the related record keeping

The prevention of industrial espionage is aided by all EXCEPT:

Federal and state laws.

The general guidelines, known as the generally accepted auditing standards, which include the concepts of adequate planning and supervision, internal control, and evidence relate to the:

Fieldwork Standards

When creating or reading a system flowchart, the triangle symbol represents a:

File

Select the correct statement from the following:

Financial statements must be prepared before the closing entries are journalized.

Functions of corporate governance includes all of the following except:

Financial stewardship

The policies and procedures involved in purchasing property; capturing and maintaining relevant data about the assets; paying for and recording the related assets; depreciation and other expenses; and gains or losses are collectively referred to as:

Fixed asset processes

The book of original entry for any transaction not recorded in a special journal is the:

General Journal

In order to achieve the objective of managing risk, management should establish control structures that include, at a minimum:

IT controls, IT governance, corporate governance, and accounting internal controls

Which of the following is not a part of IT performance?

IT security and breach issues

Which of the following statements is false?

IT systems have not had a major impact on the input of data into the accounting information syste,

All of the following are issues with cloud computing except for:

Increased Accessibility

Which of the following is most likely to be an attribute unique to the financial statement audit work of CPAs, compared with work performed by attorneys or practitioners of other business professions?

Independence

This activity serves as a method to confirm the accuracy and completeness of data in the accounting system:

Independent checks

Although there are a number of organizations that provide detailed guidance, it is still necessary for auditors to rely on other direction regarding the types of audit tests to use and the manner in which the conclusions are drawn. These sources of information include:

Industry Guidelines

Value added networks or VANs, features all of the following EXCEPT:

Industry standard.

Regardless of whether the results are printed or retained electronically, auditors may perform all of the following procedures to test application outputs, except:

Integrated Tests

Items associated with equity include all but:

Interest

Which of the following relationships would be allowed for a CPA firm?

Internal audit outsourcing and financial information systems design and implementation.

Select the correct statement from those listed below.

Internal managers need much more frequent and detailed reports than external users.

Which of the following statements about reporting is true?

Internal reports are tailored to the specific needs of each management level and function.

The global computer network, or "information super highway", is the:

Internet

The primary difference between ERP and ERP II systems is that ERP II may include:

Internet EDI

When a company uses the:

Internet for exchanges such as B2C transactions, it must give access to potential customers.

A company's private network, accessible only to the employees of that company is the:

Intranet

A company's computer network uses web servers, HTML, and XML to serve various user groups. Which type of network best serves each of the following users? Employees Suppliers

Intranet Extranet

Which of the following correctly orders the networks from the network that allows access to the least amount of people to the greatest amount of people?

Intranet, Extranet, Internet

The separation of the custody of cash from the accounts receivable record keeping will help to minimize the related risk of:

Invalid cash receipts

In order to help safeguard the processing integrity in an electronic business environment, a company should implement input controls such as field check, validity check, limit check, reasonableness check, and computer logs in order to reduce the risk of:

Invalid data entry

The internal control process that requires that the bank reconciliation be performed monthly, will help to minimize the risk of:

Invalid payments

Investment processes:

Invest excess funds.

Earnings management:

Is the act of misstating financial information.

If one module in the ERP system fails,

It has the potential to stop or disrupt all processes across the entire enterprise

Which of the following is not an advantage of cloud computing when compared to client-server computing?

It increases the amount of computer infrastructure in a company

Which of the following statements is false, related to the authorization of transactions?

It is not possible, nor is it important, to try to ensure that an organization engage only in transactions that are authorized

The objectives of an internal control system include all of the following except:

Maintain ongoing education

This phase of the fixed asset processes relates to discarding fixed assets when they become old, outdated, inefficient, or damaged.

Disposal

Items associated with debt do NOT include:

Dividends

Packet switching is a method of:

Dividing large messages into bundles for transmission over a network.

The unique name that identifies the internet site is referred to as:

Domain name

Five different input methods were identified by the authors. Which of the following is one of those input methods?

EDI

The major difference between EDI and e-business is:

EDI uses dedicated networks and e-business uses the internet

ERP system benefits include all EXCEPT:

ERP systems are configured upon implementation to exceed any reasonable business growth in the future.

Which of the following statements, related to business processes, is false?

Each business process has a direct effect on the financial status of the organization

Operations may be performed by all of the following except:

Each of the above is a valid form of operations.

Physical controls include all but:

Each of the answers, A, B, and C are correct.

Which of the following factors influences the need to safeguard and monitor inventory movement?

Each of the answers, A, B, and C are correct.

Each table in a database must meet all of the following conditions EXCEPT:

Each row must be uniquely named

The falsification of accounting reports is referred to as:

Earnings Management

E-commerce is:

Electronically enabled transactions between a business and its customers.

A control that limits the risk of network break-ins is the coding of data that makes data unreadable to those without the appropriate key. This process does not stop the breaches, but will make the data useless.

Encryption

Closing entries:

End the fiscal period.

A set of processes, software and hardware tools, methodologies, and technologies to integrate software systems is referred to as:

Enterprise application integration

A database is a (n):

Entire set of files.

The theft of proprietary company information is called:

Espionage

As the result of the passage of the Sarbanes-Oxley Act, CPA firms have unlimited ability to provide non-audit services to their audit clients.

False

Auditors must think about how the features of a company's IT systems influence its management assertions and the general audit objectives even though these matters have little or no impact on the choice of audit methodologies used

False

Batch processing occurs when transactions are processed as soon as they are entered.

False

Because of the infrequency of payroll processing and the sequential nature of the payroll process, many companies find that real-time processing is well-suited for payroll activities.

False

Business to business sales on the internet are referred to as e-commerce.

False

Copies of invoices should be filed in the account in alphabetic order by name of the vendors.

False

Data normalization allows repeating groups such as the same vendor name in multiple locations of the primary key field of the same table.

False

Data redundancy occurs when the same customer has more than one database record.

False

E-business is a type of e-commerce

False

Establishing proper processes, internal controls, and ethical guidelines does not lead to better corporate governance, even though it does improve the financial stewardship.

False

General controls are used specifically in accounting applications to control inputs, processing, and outputs

False

General controls relate to specific software and application controls relate to all aspects of the IT environment.

False

If an employee's personal smart phone or tablet is lost or stolen, the company has the right to apply a remote wipe, to remove any company data

False

In XBRL complex financial statements are presented only in a static mode.

False

In order to fulfill the obligations of stewardship and reporting, management has to create a code of ethics

False

It is necessary for an IT system to be networked to an external internet to be open to opportunities for unauthorized access

False

Modular implementation and pilot implementation are both considered methods of implementation.

False

Of all the principles applicable to auditors, the one that generally receives the most attention is the requirement that financial statement auditors maintain integrity.

False

One advantage of the interview process is efficiency.

False

Online processing is best suited to sequential access files

False

Online processing is the opposite of real-time processing

False

Only the purchasing department should authorize the processing of a cash disbursement transaction.

False

Processes in supply chain management involve trading processes from a supplier to a business only.

False

SQL stands for Sequential Query Language.

False

Strong internal controls are just as important for small organizations with few employees paid once per month as it is for large organizations with numerous employees being paid weekly.

False

Substantive tests are also referred to as compliance tests.

False

TCP/IP is an abbreviation for terminal communications protocol/Internet protocol.

False

Telecommuting workers cause two sources of risk exposures for their organizations - the network equipment and cabling in addition to the teleworker's computer - with only "entry- point" being teleworker's computer

False

The AICPA and the Canadian Institute of Chartered Accountants worked together to develop IT guidelines, commonly referred to as COBIT

False

The IT governance committee will be constantly monitoring the IT system to look for fraud and system abuse.

False

The PCAOB/AICPA Code of Professional Conduct is made up of two sections. One section, the rules, are the foundations for the honorable behavior expected of CPAs while performing professional duties.

False

The Sarbanes-Oxley Act decreased management's responsibilities regarding the fair presentation of the financial statements.

False

The accounting department is responsible for implementing internal controls over each business process.

False

The board of directors must decide between debt, assets, or equity for capital funds.

False

The data warehouse is up dated as transactions are processed.

False

The hiring of employees is considered to be a routine process.

False

The individuals who are given the authority to establish sales prices, credit limits, and guidelines for accepting customers should be sure to keep most of the information confidential.

False

The strength of SAP is the human resources aspects of an organization.

False

When files are organized as sequential access, the sequence is normally based on one key record in each file

False

When in the systems design phase and creating an in-house accounting software, the feasibility aspect is the same as in the systems planning stage.

False

When perpetual inventory concepts are utilized, a physical inventory count to determine the quantity of inventory on hand is not required.

False

When safeguarding assets, there is no trade-off between access and efficiency

False

When the customer is billed, the accounts receivable records should be updated to reflect the decreased balance.

False

When using a SQL query language you are restricted to searching two tables for common values such as Vendor Name.

False

With a client/server system all processing is done on the server.

False

ERP modules include all EXCEPT:

Operational database

Fraudsters typically try to justify their behavior by telling themselves that they intend to repay the amount stolen or that they believe the organization owes them the amount stolen. This justification is referred to as:

Opportunity

This type of control is intended to help ensure the accuracy, completeness, and security of outputs that result from application processing:

Output Controls

There are many different types of documentation necessary to operate and maintain an accounting system. These types of documentation include all of the following, except:

Output Examples

General controls in IT systems are divided into five broad categories. Which of the following is NOT one of those categories?

Output controls

When a person alters a system's checks or reports to commit fraud it is referred to as:

Output manipulation

Reports and documents, such as income statements, aged accounts receivable reports, checks, and invoices are referred to as:

Outputs of the system

Which of the process map symbols is used to show the start and / or finish of a process?

Oval

For a given pay period, the complete listing of paychecks for the pay period is a:

Payroll register

Which of the following is not an advantage of fixed asset software systems when compared with spreadsheets?

Manual processes to link to the general ledger.

MRP applications are:

Manufacturing resources planning software

_______ is accomplished through ongoing management activities, separate evaluations, or both

Monitoring

The AICPA's Trust Services Principles practice that states that the organization should have procedures to address privacy related inquiries or disputes is under the title of:

Monitoring and enforcement.

E-commerce business benefits include all EXCEPT:

More rigid advertising and product presentation requirements.

An important requirement of CPA firms is that they must be ________ with regard to the company being audited. The requirement allows CPA firms to provide a completely unbiased opinion on the information it audits.

Neutral

Internal users: 1. Need more frequent reports than external users. 2. Need the same reports as external users to manage the operation. 3. Do not utilize nonfinancial information in the planning and control of operations. 4. Utilize nonfinancial information in the planning and control of operations.

Only 1 and 4.

An ERP system is a software system that provides each of the following EXCEPT:

Physical controls for the prevention of inventory theft.

In a manual system with proper segregation of duties, an employee in the general ledger department should only

Post transactions to the general ledger.

When the proper tone of corporate governance is in place:

Proper stewardship of assets increases.

A request for proposal (RFP) is used during the

Purchase of software

Special journals include the:

Purchases journal.

According to the textbook, after receiving a returned product and checking its condition, all of the following options are available to a company except:

Record an allowance for doubtful accounts on the product

Perpetual inventory systems:

Record changes in inventory categories whenever material is moved from one category to another.

Which of the following is NOT a direct advantage for the consumer from e-commerce?

Reduced order-processing cost

Which of the following is not an objective of IT enablement?

Reduced security problems

Two or more computer network or data servers that can run identical processes or maintain the same data are called:

Redundant servers

Which of the following is not a common form of employee fraud?

Refund fraud

Which of the following is not a part of risk analysis?

Risk management

An electronic hardware device that is located at the gateway between two or more networks is a(n):

Router.

This type of transaction is one that a business encounters on a regular, recurring basis. The volume of the transactions is so large that transactions and the related accounting activities become second nature to the employees responsible for handling them. Specific authorization for each of these transactions is not necessary. The type of transaction referred to is:

Routine transaction

Which company developed the first true ERP system?

SAP

This document is prepared and sent to the customer once the shipment has occurred. The document provides the details of the sale and requests payment.

Sales Invoice

Which of the following two terms both refer to the same document?

Sales order & purchase order

In the context of cloud computing, what does scalability mean for a growing company?

Scalability allows a growing company to purchase new capacity incrementally from a cloud provider

The assessment of the realistic possibility that the proposed IT system can be implemented within a reasonable amount of time is called:

Schedule Feasibility

The process that plans the timing for production activities is referred to as:

Scheduling.

Magnetic tape is a form of

Sequential access media.

Processing of a flat file table is:

Sequential.

Manpower displacement through automation:

Should be a concern of management.

When a person, using a computer system, pretends to be someone else, it is termed:

Spoofing

Within accounts payable, to ensure that each voucher is submitted and paid only once, each invoice approved to be paid should be:

Stamped "paid" by the check signer.

When management has designed, implemented, and continually manages processes and internal controls, it is helping to ensure proper ________.

Stewardship

The responsibility of management to safeguard assets and funds entrusted to them by the owners of an organization is referred to as:

Stewardship Responsibility

The major activities within the conversion process include all but

Strategic planning that supports the company's operational goals.

This type of question is designed such that the format and range of the answer is known ahead of time.

Structured Question

This form of encryption uses a single encryption key that must be used to encrypt data and also to decode the encrypted data

Symmetric encryption

The systematic steps undertaken to plan, prioritize, authorize, oversee, test, and implement large-scale changes to the IT system are called:

System Development Life Cycle

A detailed study of the current system to identify weaknesses to improve upon and strengths that should be maintained is referred to as:

System Survey

Clues that a ghost employee may exist in the company would include all of the following, except:

The personnel file contains no duplicate addresses

Decision makers are typically forced to rely on others for information. When the source of the information is removed from the decision maker, the information stands a greater chance of being misstated. A decision maker may become detached from the source of information due to geography, organizational layers, or other factors. This describes which cause of information risk?

The remoteness of information

Which of the following is not one of broad categories of controls?

The risk of loss due to a natural disaster

An example of vertical integration is a manufacturer who mines the raw materials, produces the product, and then sells it in company owned stores.

True

An intranet is a private network accessible only to the employees of a company.

True

An underwriter is a third party that contracts with a corporation to bring new securities issues to the public market.

True

Companies that reward management with incentives to achieve a growth in earnings is running the risk that management will also have more motivation and pressure to falsify the financial statements to show the higher amounts

True

Company to company sales normally occur on account and involve a time span given for the customer to pay the vendor. The actual number of days will depend on the credit terms and the diligence of the customer concerning on-time payments.

True

Data are the set of facts collected from transactions.

True

Data warehouse files are non-volatile, and not frequently updated while operational databases are updated with each transaction that affects them.

True

Designated members of management should be given the responsibility for authorizing the actual payments and sign their signatures on the face of the check.

True

During the operation phase of the IT system, it is necessary that management receive regular reports that will enable management to determine whether IT is aligned with business strategy and meeting the objectives of the IT system.

True

E-business is the use of electronic means to enhance business processes.

True

E-commerce is electronically enabled transactions between a business and its customers.

True

E-commerce provides the potential for much richer marketing concepts that include video, audio, product comparisons, and product testimonials or product tests.

True

E-mail spoofing is more of an irritation to an organization that a fraud threat

True

Each organization may approach IT governance in a different manner, but each organization should establish procedures for IT governance.

True

Feedback needed by management to assess, manage, and control the efficiency and effectiveness of the operations of an organization relates to both financial and operational information

True

Fixed assets are one area where earnings management may be prevalent due to the judgmental nature of the underlying data.

True

General controls must be tested before application controls.

True

General ledger employees should record journal vouchers, but they should not authorize journal vouchers, have custody of assets, or have recording responsibility for any special journals or subsidiary ledgers.

True

Historically, there have been a large number of cases of fraud, theft, manipulation, and misuse of funds in the areas of payroll and fixed assets.

True

If a vendors waits too long to send the bill to the customer due to the fact that it could cause a delay of the collection of the cash.

True

In order to match company strategy to IT systems, the company needs to have an IT governance committee and a formal process to select, design, and implement IT systems.

True

Integrated IT systems that are used to conduct internet sales in a business to customer manner are referred to as e-commerce.

True

It is necessary to use a computer to accomplish software piracy

True

Random access means that any data item on the storage media can be directly accessed without reading in sequence.

True

The "intercompany" component of electronic data interchange means that two or more companies are conducting business electronically

True

The Internet (interconnected networks) serves as the backbone for the World Wide Web (WWW).

True

The auditor's understanding of internal controls provides the basis for designing appropriate audit tests to be used in the remaining phases of the audit.

True

The corporate governance structure includes internal controls in addition to systems and processes.

True

The customer company, who uses a cloud provides, must have some IT structure to access and use the data stored in a cloud.

True

The economic feasibility study would answer the question about whether the benefits of the proposed IT system outweigh the costs.

True

The major function within the conversion process is the logistics function.

True

Today's ERP systems can be traced back to the first generation of materials requirements planning software.

True

When a client plans to implement new computerized systems, auditors will find it advantageous to review the new system before it is placed in use.

True

When a company is revising systems, there are intangible benefits that are difficult to estimate in dollars. These intangible benefits should be included in the project team's report.

True

When an invoice is paid, it should be canceled to indicate that it has been paid.

True

When audit clients use a database system, the relating data is organized in a consistent manner which tends to make it easier for auditors to select items for testing.

True

When automated matching is used, the system will not approve an invoice for payment unless the items and quantities match with the packing slip and the prices match the purchase order prices

True

Select the true statement from the following.

URL stands for uniform resource locator while http stands for hypertext transmission protocol.

Which of the following internal controls is typically associated with the maintenance of accurate inventory records?

Using physical inventory counts as a basis for adjusting the perpetual records

To maintain adequate records and documents in a manual general ledger system, there are two important requirements. These are:

Well-defined chart of accounts & adequate audit trail

An enterprise resource planning (ERP) system allows a sales representative to provide a customer with all of the following information EXCEPT:

What is the cost of the product?

Which of the following is the most common method of detecting occupational fraud?

Tip from an employee, customer, or vendor

It is the ethical responsibility of employees:

To collect only necessary data from customers

EDI systems have many advantages within the revenue and cash collection processes. Which of the following is not one of those benefits?

Trading partners gaining access to data.

This occurs when the IT system automatically makes a list of users and the actions they take within the IT system.

Transaction Logging

All of the following indicate a high level of risk associated with sales returns, EXCEPT:

Transactions may be recorded in the wrong amount

The human capital management module of an ERP such as SAP would include all of the following components except:

Workforce termination management

An example of a URL is:

http://www.cjb.org.

An example of a domain name is:

jhs-email.com.

Which of the following is not correct regarding the differences in the ways that real-time systems differ from batch systems?

(Real-Time systems)Processing choices are menu-driven (Batch systems)Processing is interactive

Which of the following is the correct chronological order of events in the purchase return process?

1 = receive return authorization; 2 = prepare debit memo; 3 = goods returned; 4 = receive credit or check

Material requirements planning (MRP) software: 1. Calculated raw materials quantities needed for manufacturing. 2. Calculated lead times on raw materials orders. 3. Calculated material needs on accounts payable data.

1 and 2 only

The speed of the U.S. Internet backbone is _______ bytes per second.

1 trillion

The suffix of the domain name will identify the type of organization that owns the rights to that domain. Which of the following is a correct example of the suffix and related organization type?

.gov = governmental organization or unit

According to the textbook, which of the following are the two specific ways in which a company may recognize the need to conduct operations? 1. A sales order is received 2. A sales forecast is made 3. A production schedule is created 4. A physical inventory count is conducted

1 & 2

A system which involves recording purchases of raw materials inventory, recording all the components of work in process, and recording the total cost of sales for products completed and sold is referred to as:

A perpetual inventory system.

Which of the following is the most significant disadvantage of auditing around the computer rather than through the computer?

A portion of the audit trail is not tested.

General controls of the IT system would include all of the following, except:

Accuracy

The risks of e-commerce, or e-business, include all of the following, except:

Accuracy

Application controls of the IT system would include:

Accuracy and Completeness

The main purpose of an audit is to assure users of the financial information about the:

Accuracy and completeness of the information.

Variances represent the differences between:

Actual costs and the standard costs applied.

Many companies use a public cloud computing model for software, data storage or both. Which of the following is an advantage to the public cloud computing model?

All of the above are advantages

The advantages to real-time processing include:

All of the above are advantages

Which of the following is a characteristic of computer fraud?

All of the above are characteristics

Automatic integrated backup

All of the above are correct.

Data reveal relationships between records. These can be thought of as:

All of the above are examples of relationships.

Which of the following is an example of a source document?

All of the above are examples of source documents

Factors that limit the effectiveness of internal controls include all of the following except:

All of the above are factors that limit the effectiveness of internal controls

Which of the following IT controls would NOT be important in an extranet?

All of the above are important IT controls.

In addition to ethical practices, management has an obligation to maintain a set of processes and procedures to assure accurate financial reporting and protection of company assets. This obligation arises because:

All of the above are reasons for the obligation.

There are a number of increased reporting requirements as the result of Sarbanes-Oxley and IFRS. These requirements have made it imperative for companies to:

All of the above are required.

There are many uses of electronic funds transfer related to the payroll process. Which of the following is not one of those uses?

All of the above are uses of electronic funds transfer.

Which of the following company activities would NOT be considered a productive activity?

All of the above, A, B, and C, are considered productive activities.

A proper corporate governance structure must be in place in order to properly deter instances of:

All of the above, A, B, and C, are correct.

General ledger employees should record journal vouchers, but they should not

All of the above, A, B, and C, are correct.

Select the correct statement from the following.

All of the above, A, B, and C, are correct.

The raising of capital:

All of the above, A, B, and C, are correct.

The internal control of cash receipts related to adequate records and documents would include which of the following?

All of the above.

The term conversion processes is often used synonymously with:

All of the above.

Which of the following statements is true regarding an operational database?

An operational database includes data for the current fiscal year and supports day -to-day operations and record keeping for the transaction processing system.

The purpose of this phase is to question the current approaches in the system and to think about better ways to carry out the steps and processes of the system.

Analysis of Systems Survey

Management would use the _____________ module for feedback from the ERP system to assist in the proper management and control of operations.

Analytics

Data mining:

Analyzes past patterns to predict future events.

IT controls can be divided into two categories. Which of the following is a correct statement of one those categories?

Application controls are used specifically in accounting applications to control inputs, processing, and output

The purchase of fixed assets is likely to require different authorization processes than the purchase of inventory. Which of the following is not likely to be part of the authorization of fixed assets?

Approval of the depreciation schedule.

The segregation of duties related to sales returns would ideally separate the function of performing the credit memo activity and all of the following, except:

Approve the credit memos

Which of the following questions is most likely to be found on an internal control questionnaire concerning a company's conversion processes?

Are approved requisitions required when materials are released from the company's warehouse into production?

A Data Flow Diagram is used by systems professionals to show the logical design of a system. The advantage of the method is that it uses only four symbols. The symbol used to represent the flow of data is a(n):

Arrow

The use of the SDLC for IT system changes is important for several reasons. Which of the following is not part of the purposes of the SDLC processes?

As part of the audit of an IT system

Which of the following types of fraud is the most common, according to the Association of Certified Fraud Examiners?

Asset Misappropriation

Economic order quantity (EOQ) is a function:

Associated with inventory control.

Accounting services that improve the quality of information provided to the decision maker, an audit being the most common type of this service, is called:

Assurance Services

A primary objective of output controls would be:

Assure the accuracy and completeness of the output

Transactions are recorded in the special journals and subsidiary ledgers:

At the time of the transaction.

Hierarchal databases:

Are efficient in processing large volumes of transactions with explicit linkages.

Which of the following questions would most likely be included in an internal control questionnaire concerning the completeness of purchasing transactions?

Are prenumbered purchase orders, receiving reports, and vouchers used, and are the entire sequences accounted for?

The transmission of packets:

Are usually sent in sequential order.

The Phar-Mor fraud began when management:

Attempted to make the actual net income match the budgeted amounts

The oval used in an entity relationship diagram is used to represent a(n):

Attribute

When discussing entity relationship diagrams, this is considered to be a characteristic of an entity

Attribute

In database terminology, columns are also called:

Attributes

A type of assurance services that involves accumulating and analyzing support for the information provided by management is called an:

Audit

This phase of auditing occurs when the auditors evaluate all the evidence that has been accumulated and makes a conclusion based on that evidence.

Audit Completion / Reporting

The proof of the fairness of the financial information is:

Audit Evidence

During this phase of the audit, the auditor must gain a thorough understanding of the client's business and financial reporting systems. When completing this phase, the auditors review and assess the risks and controls related to the business.

Audit Planning

Audit tests developed for an audit client are documented in a(n):

Audit Program

The purpose of segregating the duties of hiring personnel and distributing payroll checks is to separate the:

Authorization of transactions from the custody of related assets.

Proper segregation of functional responsibilities calls for separation of the functions of:

Authorization, recording, and custody

A payroll voucher:

Authorizes the transfer of cash from a main operating account to a payroll account

Internal control problems would be likely to result if a company's payroll department supervisor was also responsible for:

Authorizing changes in employee pay rates.

The approval or endorsement from a responsible person or department of an organization that has been sanctioned by top management is the process of:

Authorizing transactions

The category of control activities referred to as segregation of duties requires that certain activities should be the responsibility of different person or department. The three duties that are to be separated are:

Authorizing, recording, and custody

A computer software technique in which the computer software matches a Purchase Order to its related receiving report and invoice is called a(n):

Automated matching

A system of computer hardware and software in which the software matches an invoice to its related purchase order and receiving report is called:

Automated matching

Computerization of the conversion process results in all except:

Automatic computation of materials requirements based on purchase orders.

The risk related to this category of Trust Principles is system or subsystem failure due to hardware or software problems

Availability

There are four primary functions of corporate governance. Which of the following is NOT one of those functions?

Availability

The risk that an unauthorized user would shut down systems within the IT system is a(n):

Availability risk

When a company sells items over the Internet, there are many IT risks. The risk of hardware and software failures that prevent website sales would be a(n):

Availability risk.

Establishing and maintaining a culture where ethical conduct is recognized, valued, and exemplified by all employees can be accomplished by doing all of the following except:

Avoiding some conflicts of interest

When a payment has been made, the cash disbursements clerk will clearly mark the invoice with information pertaining to the date and the check number used to satisfy the obligation. This process is called:

Cancelling the invoice

This document is a financial plan detailing all of the company's investments in fixed assets and other investments.

Capital Budget

The resource management component of the logistics function has all of the following elements except:

Capital budgeting.

The component of internal control, identified in the COSO report, that sets the tone of an organization and includes the consciousness of its employees is:

Control Environment

Not-for-profit organizations would be interested in:

Cash flows, funding sources, and expenditures.

Examples of customer fraud include all of the following except:

Cash fraud

The careful oversight of cash balances, forecasted cash payments, and forecasted cash receipts to insure that adequate cash balances exist to meet obligations is called:

Cash management

The following circumstances may indicate risks related to cash collections, except:

Centralized cash collections

Select the correct statement from the following.

Centralized data processing and databases require dependable and extensive processing power for large organizations.

OBIT is an acronym for which of the following?

Control Objectives for Business and Information Technology

The Trust Services Principles document divided the risks and controls in IT into five categories. Which of the following is not one of those categories?

Certification

GAAS, generally accepted auditing standards, provide a general framework for conducting quality audits, but the specific standards - or detailed guidance - are provided by all of the following groups, except:

Certified Fraud Examiners

Financial statement audits are performed by _________ who have extensive knowledge of generally accepted accounting principles (GAAP) in the US and/or International Financial Reporting Standards (IFRS).

Certified Public Accountants

A company should study risks common to its system prior to deciding the mix of controls needed. High-risk characteristics that might justify the need for extensive internal controls include all of the following, except:

Changes in price or vendors is frequent.

Examples of characteristics that indicate a company may be more risky with respect to the revenue process include all of the following, except:

Changes in sales prices or customers are infrequent.

Goods received are unacceptable due to may different situations. Which of the following is not one of those situations?

Changes in the company needs regarding future sales or production

In response to the need for internal controls above and beyond what was described by COSO, the Information Systems Audit and Control Association developed an extensive framework of IT controls entitled:

Control Objectives for Information Technology (COBIT)

COSO describes five components of internal control. Which of the following terms is best described as "policies and procedures that help ensure management directives are carried out and management objectives are achieved"?

Control activities

The COSO report identified a component of internal control as the policies and procedures that help ensure that management directives are carried out and that management directives are achieved The component is:

Control activities

Management has the responsibility, and the ability, to take action to reduce risks or to lessen the impact al nearly all risks an organization faces. The steps taken by management to lessen to risk or reduce the impact of the risk, are referred to as:

Controls

General controls for an IT system include:

Controls over the physical environment and over the physical access

Which of the following is not a condition in the fraud triangle?

Conversion

An example of concealment would include:

Changing the payee on a check improperly paid by the organization

Which of the following correctly orders the hierarchy of data from smallest to largest?

Character, field, record, file, database

Which of the following is not an advantage to a cloud model of e-mail?

Costs associated with maintaining are higher but are more controllable

The IT governance committee is made up of many different individuals within the organization. Which of the following would not be one of those individuals?

Chief External Auditor

The functional responsibilities within an IT system must include the proper segregation of duties. Which of the following positions is not one of the duties that is to be segregated from the others?

Chief information officer

The AICPA's Trust Services Principles practice that states the organization should ask about the collection, retention, and of the use is under the title of:

Choice and consent

The AICPA's Trust Services Principles practice that states the organization should provide the choice to its customers regarding the collection of data is under the title of:

Choice and consent

In this type of distributed system, each computer or process on the network is either a Client or a server.

Client / Server System

In order to organize the study of accounting information systems, the authors divided the systems in place into three categories. Which of the following is not one of those categories?

Client-Server Systems

This type of computing means that there are two types of computers networked together to accomplish the application processing

Client-Server computing

When an organization has this type of network, there are two types of computers networked together to accomplish the application processing:

Client-server computing

SAP R/3 operates on a:

Client-server environment with open architecture.

In a manual accounting system, the processing of accounting information includes:

Closing the necessary ledger accounts

A contemporary type of computer infrastructure that is used by an increasing number of companies involves the use of shared services, software, and/or data stored on servers at a remote location, which are accessible over a network, is referred to as:

Cloud Computing

The fastest growing area of IT is:

Cloud-based database services

A set of documented guidelines for moral and ethical behavior within an organization is termed a(n):

Code of Ethics

According to the COSO report, there are five different interrelated components of internal control. Which of the following is not one of those five components?

Code of Ethics

The company's development and adherence to this should reduce the opportunities for managements or employees to conduct fraud

Code of ethics

The AICPA's Trust Services Principles practice that states that only the data that is necessary for the purpose of conducting the transaction should be collected is under the title of:

Collection

Jamie Stark, a sales employee, stole merchandise from her employer, and Frank Adams, the accounting clerk, covered it up by altering the inventory records. This is an example of:

Collusion

With the advent of technology, the Internet, and the WWW:

Commerce is moving both from electronic to physical and from physical to electronic.

Which of the following is NOT one of the three components of electronic data interchange?

Commerce- encompasses all forms of electronic trading

A comprehensive report on enterprise risk management was issued by this organization

Committee on Sponsoring Organizations

Intranets are used for each of the following EXCEPT

Communication and collaboration.

Companies should maintain proper security barriers such as firewalls on all of the following except:

Company flash drives

This phase of the systems design for in-house development of software involves the identifying the alternative approaches to systems that will meet the needs identified in the system analysis phase.

Conceptual design

The generally accepted auditing standards are divided into three groups. Which of the following is not one of those groups?

Basic Standards

There are two modes of processing transactions in accounting systems. The mode that requires all similar transactions to be grouped together and be processes at the same time, is referred to as:

Batch Processing

An organization that has applications having large volumes of similar transactions that can be processed at regular intervals is best suited to use which method of processing?

Batch processing

When all similar transactions are grouped together for a specified time and then processed together as a group, the process is referred to as:

Batch processing

When similar transactions are grouped together for a specified time for processing, it is called:

Batch processing

Select the false statement from those provided.

Batch processing has a faster response time than real-time processing due to the grouping of like data items.

A company with revenue of $50 million would be most likely to purchase software from which one of the four market segments?

Beginning ERP Segment

This law, also known as the first-digit law, was named after a physicist who discovered a specific, but non-uniform pattern in the frequency of digits occurring as the first number in a list of numbers:

Benford's Law

Which of the following ERP implementation methods is rarely used today due to its high rate of failure?

Big Bang

More than one-half of ERP implementations by the ________ approach experienced significant failures or problems in the 1990s, and nearly one-third of these implementations abandoned in progress.

Big bang

The terms of agreement between the company and the common carrier are documented in a(n):

Bill of Lading

This document, prepared by the vendor, provides details of the items included in the delivery; and is normally signed by the receiving clerk as verification of receipt.

Bill of lading

The form that specifies the components of a product, including descriptions and quantities of materials and parts needed is the:

Bill of materials.

This type of authentication uses some unique physical characteristic of the user to identify the user and allow the appropriate access to the system

Biometric device

The smallest unit of information in a computer system can have only one of two values, zero or one, and is referred to as a(n):

Bit

The correct order of the computer data hierarchy is:

Bit, byte, field, record, file, database

This document, prepared by the purchasing department, for use by the receiving department, is copy of the purchase order that eliminates all data about the price and quantity of the items ordered.

Blind purchase order

To resolve discrepancies on invoices so that they can be paid on a timely basis, management may issue which of the following?

Blocked invoice Report

Which of the following groups has an ethical obligation to establish the proper tone at the top, strong internal controls, and high ethical standards?

Board of Directors and Management

Long-term debt results from borrowing funds via:

Bonds and loans with payment schedules several years in the future.

Which of the following independent checks would be part of the internal controls for fixed assets?

Book value of the assets should be compared to the insurance records.

Data within an ERP system may be stored in a(n):

Both A & C

Examples of data collection events are

Both A and B are examples of data collection.

The current standard HTML 5 has the following benefits over previous versions:

Both A and C

EDI via ANSI X.12 implementation is hampered by:

Both A and C above are correct answers.

Data in the data warehouse:

Both A and C are correct.

A "Where" condition within a structured query of a relational database:

Both B and C are correct.

A common interest for manufacturing, retail, and service firms is:

Both B and C.

The ways to determine a secure sockets layering connection is:

Both answers, B and C, are correct.

Which of the following statements about payroll and fixed asset processes is true?

Both have routine and non-routine processes

The need to match IT systems to organizational objectives emphasizes the need for the IT governance committee to include top management as its members because:

Both of the above

When attempting to prioritize IT projects, the IT governance committee needs to consider:

Both of the above

IT auditors may need to be called in to:

Both of the above.

Select the correct statement from those below.

Bricks and mortar refer to traditional stores while brick and click businesses are both brick and mortar and e-commerce businesses.

A prescribed sequence of work steps preformed in order to produce a desired result for the organization is called a(n):

Business Process

The fundamental rethinking and radical redesign of business processes to bring about dramatic improvements in performance is called:

Business Process Reengineering

The purposeful and organized changing of business processes to make them more efficient is referred to as:

Business Process Reengineering

The many sets of activities within the organization performed to accomplish the functions necessary to continue the daily operations are referred to as:

Business Processes

When a transaction occurs there are systematic and defined steps that take place within the organization to complete all of the underlying tasks. These "defined steps" are referred to as:

Business Processes

A proactive program for considering risks to the business continuation and the development of plans and procedures to reduce those risks is referred to as:

Business continuity planning

A prescribed sequence of work steps completed in order to produced a desired result for an organization is the definition of:

Business process

Which of the following statements is not true?

Business processes categorized as expenditure processes are not intended to be processes that serve customers

Which of the following is NOT one of the reasons for the increased spending on ERP systems since 2004?

Business processes were separated and standardized.

A unit of storage that represents one character is referred to as a:

Byte

Which of the following terms is most closely related to data redundancy?

Concurrency

If a company stores data in separate files in its different departmental locations and is able to update all files simultaneously, it would not have problems with

Concurrency.

Which of the following is NOT one of the types of input controls?

Confidentiality check

Employee Ethical considerations, related to IT governance, would include which of the following?

Confidentiality for those who serve on the project teams.

The IT system includes this type of table for software, hardware, and application programs that contain the appropriate set-up and security settings

Configuration table

Standardizing data:

Configures all of the data from numerous departments into a single data configuration.

The IT environment plays a key role in how auditors conduct their work in all but which of the following areas:

Consideration of Information Fairness

The _________ is an integrated collection of enterprise-wide data that ideally should include 5 to 10 years of nonvolatile data.

Data warehouse

A large disk storage for accounting and operating data is referred to as a(n):

Database

When a company buys data storage from a cloud provider, the arrangement is referred to as:

Database as a service

A software system that manages the interface between many users and the database is called:

Database management system

The document prepared when purchased items are returned is a(n):

Debit memo

The document that identifies the items being returned, along with the relevant information regarding the vendor, quantity and price, is called:

Debit memo

The sales journal would have columns for a:

Debit to accounts receivable and a credit to sales.

When creating or reading a system flowchart, the diamond represents a(n):

Decision

Advantages of distributed databases include all EXCEPT:

Decreased user involvement.

There are many possible indirect benefits to management when management fraud occurs. Which of the following in not an indirect benefit of management fraud?

Delayed exercise of stock options

The three phases of fixed assets processes, that span the entire useful life of the assets, include all of the following, except:

Depreciation

Management of an internet retail company is concerned about the possibility of computer data eavesdropping and wiretapping, and wants to maintain the confidentiality of its information as it is transmitted. The company should make use of:

Data encryption

Each of the following represents an application of B2C commerce EXCEPT:

Data exchanges.

The process of searching data within the data warehouse for identifiable patterns that can be used to predict future behavior is referred to as:

Data mining

The process of searching for identifiable patterns in data is called:

Data mining

Select the correct statement from the following.

Data redundancy and concurrency are not features of well-designed database management systems.

In the late 1990s, the Y2K compatibility issue was concerned primarily with computer systems':

Data storage

Which of the process map symbols is used to show a point in the process when a decision must be made?

Diamond

A character is a customer, client, or vendor.

False

A cloud provider generally provides only the data storage space.

False

A company is not obligated to pay for goods until 30 days after the goods are received.

False

A corporation's own stock that is repurchased by the company on the open market is a marketable security.

False

A data warehouse is a temperature controlled building where files and records are retained.

False

A database is often less open to unauthorized access than the physical, paper records, because the database has fewer access points

False

A financial statement audit is conducted in order for an opinion to be expressed on the fair presentation of financial statements. This goal is affected by the presence or absence of IT accounting systems.

False

A financial statement audit is part of the IT audit

False

A hacker is someone who has gained unauthorized access to the computer and must be someone outside the organization

False

A method of earnings management is to misclassify capitalized costs as repair and maintenance expenses.

False

A poor control environment can be overcome if the remaining components of internal control are strong

False

A purchase order is essentially an internal document, one that does not go outside the company, whereas a purchase requisition is an external document, which will be presented to an entity outside the company.

False

A reconciliation should be prepared by the same person who is responsible for the recording function.

False

A record pointer identifies a specific record in a flat database.

False

A router is an electronic hardware device that is connected to each computer to connect it to a network.

False

A sophisticated accounting system will provide the necessary accurate and effective feedback needed by management to assess, manage and control the operations of an organization

False

A strength of the supply chain concept is that inconsistencies or poor quality within the supply chain will be compensated by other strengths resulting in an overall satisfactory product.

False

A unique feature of the information contained in an individual personnel file is that it is accessed infrequently but is changed relatively frequently.

False

A user who logs in to the computer-based accounting system to enter invoices should also have access to the portion of the system that would allow her / him to order goods.

False

A vendor audit occurs when a vendor examines the books and records of a customer

False

A web server is a computer and hard drive space that connects to the backbone through lines that have less speed and capacity than the backbone.

False

A well-defined chart of accounts would contain an account titled "Rent."

False

Access to cash collections needs to limited to those who are expressly authorized to record the cash transactions.

False

Access to the operating system will not allow hackers access to the application software or the database

False

According to the 2010 Report to the Nation by the Association of Certified Fraud Examiners, the estimate of global losses due to fraud would total approximately $650 billion

False

According to the ACFE 2010 Report to the Nation, fraudulent financial statements account for less than 5% of the cases, and were the least costly form of fraud

False

Accounting for a fixed asset over the life of the asset would have features of non-routine transactions only.

False

Accounting for fixed assets requires the use of estimates - specifically the cost and the salvage value.

False

Accounting software is available to assist with payroll but it is not very efficient because of all the changes that occur to all payroll variables during the period.

False

All users of financial data - business managers, investors, creditors, and government agencies - have an enormous amount of data to use to make decisions. Due to the use of IT systems, it is easy to verify the accuracy and completeness of the information.

False

As a business grows, the volume and complexity of its transactions increase. At the same timed, there is a decrease in the chance that misstated information may exist undetected.

False

As a rule, the higher the risk, the more controls are generally required and the less costly its accounting system may become.

False

At a minimum, cash receipts should be deposited on a weekly basis.

False

At a minimum, those who handle cash should be the ones to reconcile the bank statement.

False

Auditing testing for any single general auditing objective would involve the same testing techniques even though there are different types of information collected to support different accounts and transactions.

False

Auditing, a monitoring activity, takes place only on a periodic basis

False

Auditors do not need to concern themselves with risks unless there is an indication that there is an internal control weakness.

False

Auditors have the primary responsibility to make sure that they comply with international standards in all cases.

False

Based on the cost/benefit concept, it is not necessary for management to consider the moral implications of replacing human resources with electronic resources.

False

Because conversion processes involve the physical movement of inventory throughout the operating facility and these movements are normally accomplished by material handling personnel the burden of sufficient internal controls is not required.

False

Because different companies conduct business in different manners, there tends to be few similarities in the way the related business processes are carried out.

False

Because intranets do not transmit information through the Internet or WWW they do not use protocols such as TCP/IP.

False

Because of computer interaction and the capability of almost instant verification business across the World Wide Web has a lower probably of fraud, hackers, and compromised customer privacy.

False

Because of regulatory and auditing issues, good corporate governance does not depend upon the ethical conduct of management.

False

Because of their access to the accounting system, internal managers need less detailed reports than external users.

False

Because of their sensitive nature, companies seldom sell or share customer lists or customer data.

False

Because of today's computing power and Internet accessibility, there has been a substantial increase in the use of centralized databases and centralized processing.

False

Because the ERP system will cleanse and correct data errors while importing legacy data into its RDBMS, a minimum of time, effort, and dollars will be spent on data conversion.

False

Because the point-of-sale systems are not normally connected to outside trading partners, they pose fewer risks related to availability.

False

Before ERP software systems, modules such as human resources were in separate software but well integrated with the accounting software

False

Before the paychecks are sent to management for authorization, the human resources department should compare the hours reported on the time sheets with the hours shown on the payroll register.

False

Best of breed means picking the best ERP software on the market for the particular type of business or organization.

False

Billing to the customer should take place prior to shipment so that the customer receives the bill before the merchandise arrives.

False

Biometric devises use unique physical characteristics to identify users. The most common method used is retina scans

False

Business process reengineering takes place at the systems design stage of the SDLC.

False

Business processes in an organization do not include events that are accounting transactions.

False

CRM success depends entirely on the implementation of the software package designed for customer relationship support.

False

Capital usually comes from assets or short-term debt.

False

Cash should be periodically verified by comparing the balance in the check book with the balance in the cash account in the general ledger.

False

Collusion can occur only when two employees who work for the same firm conspire to circumvent the internal controls to commit fraud or theft

False

Companies in the same line of business are not likely to have many differences in their purchasing habits.

False

Control tests verify whether financial information is accurate, where substantive tests determine whether the financial information is managed under a system that promotes accuracy.

False

Corporate governance policies and procedures must be in place to ensure that funds are expended to benefit managers and employees.

False

Corporate governance requires proper financial stewardship, and since inventories, fixed assets, and office supplies are the largest assets reported on a balance sheet, financial stewardship in these areas is especially important.

False

Customizing an ERP system is recommended wherever the business has an existing process to accomplish a goal and that process is not compatible with the ERP system.

False

Data collection in the system survey step of systems analysis involves documentation review only.

False

Data does not need to be stored in most cases.

False

Data mining is the process of searching an operational database for identifiable patterns in the data.

False

Deciphering renders data useless to those who do not have the correct encryption key

False

Defalcation and internal theft are names that refer to the misstatement of financial records

False

Disaster recovery planning is a proactive plan to protect IT systems and the related data

False

Due to interstate trade events and taxation issues the U.S. Government has standardized the definition of e-commerce.

False

Due to the integration of design, ERP systems do not require extensive testing if implementation does not entail best of breed or legacy modules.

False

Due to their level of integration, ERP systems have difficulties in properly segregating duties.

False

During a documentation review, the team would examine only relevant documentation of the proposed upgrade or modification.

False

E-business and EDI have much different advantages and risks to the vendor than what exists for the customer.

False

E-commerce is the use of electronic means to enhance business processes.

False

E-commerce only involves transactions between the business and its customers.

False

ERP applications use modules such as financials, human resources, data warehouse, and analytics.

False

ERP data is stored in both financial and operational databases.

False

ERP implementation costs are kept to a minimum by retaining the legacy computer hardware and operating systems.

False

ERP systems such as SAP normally batch their financial transactions for processing due to the large amounts of data.

False

ERP will automatically track and report any instances where an employee initiates or records an event with conflicting abilities. It is not necessary to configure the system to accomplish this.

False

Each business process has a direct effect on the financial status of an organization

False

Each time a new transaction is completed, parts of the data warehouse must be updated

False

Earnings management related to fixed assets would occur when reducing expenses by decreasing the useful life of the fixed assets.

False

Effective and efficient internal control often takes up valuable management time that could otherwise be spent on attention to revenue growth and cost controls.

False

Either the IT governance or the system development life cycle is necessary in the strategic management of IT systems.

False

Employees are more likely to hide or conceal fraudulent activity in the records of fixed assets and capital acquisition events than elsewhere.

False

Encryption is more important for dial-up networks than for wireless networks

False

Ethical issues related to data utilization are not a consideration for data collection.

False

Even though most companies collect order data from customers, the manner of receiving order data seldom varies.

False

External users need detailed balance information on every existing account in the general ledger.

False

Few accounting information systems rely on computer hardware and software to track business

False

Few deceptions and fraudulent acts in the business and accounting environment relate to revenue measurement and recognition.

False

For any company, and any asset, the method of depreciation and the related estimates (salvage value and useful life) are the same for financial statements and income taxes.

False

For most companies, fixed asset acquisitions are considered to be routine processes.

False

IFRS does not allow as much use of judgment as is allowed under GAAP.

False

IT general controls assist in preventing unauthorized access while providing adequate backup, and are the responsibility of the user.

False

IT governance is an issue for executives and top management. Lower level managers and the board of directors are outsiders in the process.

False

If a company's IT system fails, it would have little or no effect on the company's operations

False

If no source documents are used by the IT system, then the general controls, such as computer logging of transactions, become less important

False

If the operational feasibility determines that the operation will require new training of employees, then the proposed upgrade or modification should be rejected.

False

If the purchasing, receiving, accounts payable, and cash disbursements processes are completed by the same individuals, the internal controls will be stronger because someone in the company will have an overall view of company activities.

False

In a wireless network, signals are transmitted through the air rather than over cables. Anyone who wants to gain access to the network would need to know the password to access these "air- borne" signals

False

In general, designs that require more complex technology have a higher feasibility than designs with less complex technology.

False

In general, purchased software is more costly but more reliable than software designed in- house.

False

In general, the manual input method is less error prone that the electronic methods.

False

In many cases where revenue has been overstated by management, accountants have participated in the deception. Thankfully, once the overstatement has occurred, it will be offset by lower revenues in the subsequent year and normally will not recur.

False

In order for a code of ethics to reduce opportunities for managers and employees to commit fraud, it is necessary that management emphasizes this code. Punishment related to violations of the code are not necessary

False

In order to compute the book value of any asset, start with the cost of the asset and add the accumulated depreciation.

False

In order to have an automated matching system is necessary to have access to paper copies of purchase orders and invoices

False

In order to institute an automated matching system, all of the relevant files must exist in the same physical room.

False

In order to meet the objectives of internal controls, individuals with authoritative responsibilities need to have access to the record keeping functions.

False

In the Phar-Mor fraud case, management did not write or adopt a code of ethics

False

In the modern IT environment, it is necessary for an organization to follow each of the steps in the SDLC in the order presented.

False

Independent checks and reconciliations should be performed on a regular basis as part of the segregation of duties area of internal controls.

False

Independent checks can serve as a preventive control in that they uncover problems in the data or the processing

False

Independent reconciliation of the accounts payable subsidiary ledger to the general ledger control account will help to assure that all inventory has been properly recorded.

False

Information is the set of facts collected from transactions.

False

It is likely that an accountant will select a career path, within accounting, that will not in some way, involve the use of an accounting information system

False

It is likely that expenditure fraud and ethics violations could be eliminated by a strong, ethical "tone at the top" along with encouragement of ethical behavior by all employees, and strong internal controls.

False

It is necessary for students and accountants to understand the types of threats that may affect an accounting system, so that the threats can be avoided

False

It is necessary for the purchasing department to set up the proper procedures to avoid problems related to cutoff issues.

False

It is not necessary to control the humidity and temperature in the location where the computer system is housed

False

It is possible to completely eliminate risks with the proper controls

False

It is proper that the database administrator develop and write programs

False

It is the responsibility of the payroll department to make certain that all time sheets represent actual time worked by currently active employees.

False

It would not be necessary for the programming staff to have interaction with the accounting staff during the systems implementation process, as all systems design was previously completed.

False

Local ISPs connect to the backbone through lines that have less speed and capacity than the backbone.

False

MRP stands for Management Resource Projections.

False

Maintaining high ethics can help prevent fraud but will not help to detect fraud

False

Management must discourage illegal behavior by employees, such misuse of computers and theft through the computer systems

False

Manufacturing resource planning software systems are outgrowths of the ERP concept.

False

Many companies use a public cloud computing model for storage only

False

Members of management are not required to specifically approve an employee hired by the company when the new employee has been screened by an employment office.

False

Most of the records found in an employee's personnel file are accounting related.

False

Network operations typically involve a large number of computers, many users, and a high volume of data transfers, so any lack of network controls could cause widespread damage. Because of this, it is necessary for auditors to apply strict tests to a representative sample of the network.

False

Not all organizations require long-term, capital assets such as land, buildings, and equipment to operate.

False

Once a company has decided on the control processes needed, it is not necessary to have an ongoing assessment of risks

False

Once an organization has set up an effective system to prevent unauthorized access to the IT system, it is not necessary to continually monitor the vulnerability of that system

False

Once the SDLC has identified which types of IT systems are appropriate for the company, the IT governance committee becomes the mechanism to properly manage the development, acquisition, and implementation of the IT system.

False

Once the data from the source documents have been keyed into the computer, the source document can be destroyed

False

Once the system development life cycle has determined the priority it places on IT systems, the IT governance committee will manage the development, implementation, and use of the systems.

False

Once the systems development life cycle (SDLC) is complete, it is not necessary to restart the cycle unless something is brought to the attention of the IT governance committee to indicate that another cycle is required.

False

One of the greatest risks of ERP cloud systems is their vulnerability to hackers.

False

Operations processes authorize, execute, manage, and properly account for debt.

False

Organizations should have written procedures in place to identify when the costs related to fixed assets are capitalized (recorded to repair and maintenance expense).

False

Peoplesoft uses the terms "back office" in reference to managerial functions and "front office" in reference to customer and sales functions.

False

Perpetual inventory systems involve updating the inventory and cost of sales accounts only at the end of the period.

False

Public and Private cloud computing both have the benefits of reduced infrastructure and reduced costs

False

Random access means that you are searching for specific data but do not know where it is within the database.

False

Real-time processing occurs when similar transactions are grouped into a batch and that batch is processed as a group.

False

Reports disseminated to lower level managers are usually used to provide feedback and establish production schedules or sales goals.

False

Resources required in the conversion process include materials, labor, overhead, and fixed assets.

False

Routine transactions refer to common business transactions such as payroll and fixed asset transactions.

False

Routing is the issuance and movement of materials through the sales process

False

SAP R/3 had tremendous growth due to the use of closed architecture and client-server hardware compatibility.

False

SAP was the first "pure Internet" architecture, with no programming code residing on the client computer.

False

Sales and service is a term for software solutions that help businesses manage customer relationships in an organized way.

False

Segregation of duties require within an ERP system is difficult due to the free access allowed to employees.

False

Since ERP systems are modular the risks of implementation enterprise-wide are minimized.

False

Since database management and information is the responsibility and asset of the database owner, customers should not have the privilege to restrict information contained within it.

False

Since distributed databases are under the control of many individual sites rather than a single, centralized site, configuration, conformity, and security are less of an issue.

False

Small businesses, those having fewer than 100 employees, are less vulnerable to fraud and abuse than are larger businesses

False

Source of operational processes are those processes to authorize the raising of capital, execute the raising of capital, and to properly account for that capital.

False

Special journals are journals that are established to record the transactions of specific customers and vendors.

False

Specific internal control procedures to be performed, specifically independent checks and reconciliations, should be performed by someone who as the responsibility for the recording of the transactions and the custody of the assets received.

False

Spending for ERP and ERP II systems has been consistently growing since the mid 1990s and the Y2K events.

False

Strong corporate governance will prevent fraud, theft, and mismanagement within the expenditure process.

False

The AICPA Trust Principles failed to include any reference to the internal control structure of the IT systems.

False

The AICPA Trust Services Principles do not protect the history of purchases since these are classified as "public knowledge events."

False

The amount of IT structure maintained by a client would not change if the database is stored with a cloud provider rather than onsite.

False

The audit planning process is unlikely to vary if the company has adopted IFRS, or is in the process of convergence.

False

The best fit software is usually defined by the client's hardware and intranet structure.

False

The big bang theory is the easiest to implement since the switch from the legacy system to the ERP system is done on a single date throughout the organization.

False

The big bang theory of implementation is preferred due to the limited problems incurred in transition.

False

The cash disbursement process must be designed to ensure that the company appropriately records all accounts payable transactions.

False

The cash disbursements department should have the responsibility of signing and essentially approving all paychecks.

False

The cost of cloud computing is normally related to a period of time, and not to the use of the service.

False

The decision as to whether to adopt cloud-based ERP systems will not have much impact on the computer hardware and IT infrastructure needed.

False

The determination of user requirements is often discovered through the use of observation and documentation review.

False

The differences between Tier One and Tier Two software are becoming more definitive as the Tier One vendors attempt to attract larger companies.

False

The electronic timekeeping devices accumulated data throughout the period and automatically calculate batch totals. At this time, the data batches are not able to prepare the paychecks or the payroll register.

False

The evaluated receipt settlement system is an IT enabled system that reduces the time and cost of processing customer payments

False

The file or database storage for the new accounting system is always be different from the old system.

False

The final hub in the logistics function is sales.

False

The financial module of an ERP such as SAP might contain such components as financial accounting, management accounting, corporate governance, and inventory.

False

The general public has general access to the intranet and extranet networks.

False

The group of controls referred to as Source Document Controls does not include form design

False

The human resources department should be responsible for the record keeping function related to payroll.

False

The incorporation of cloud computing requires a careful, controlled approach to system design related to the costs and benefits. Other issues are not important.

False

The integration of an ERP system compensates for its scope, size, and complexity to make implementation less risky than most IT systems.

False

The intent of an ERP (enterprise resource planning) system is to provide a sales and inventory software application that will interact with the general ledger software with its sales and inventory transactions.

False

The internal controls within a system must be designed in the implementation stage.

False

The investment in fixed assets is often the largest asset reported on the income statement.

False

The longest encryption keys are 128 bits

False

The most common type of audit service is the operating audit performed by internal auditors.

False

The most important factor in controlling IT systems is the maintenance of the vulnerability assessment activities

False

The most popular type of type of unauthorized access is probably by a person known to the organization

False

The only method of exercising corporate governance over administrative processes and financial reporting is through the company's budgeting process.

False

The only person who can perform a financial statement audit of a publicly traded company is a government auditor who has extensive knowledge of generally accepted accounting principles.

False

The only risk related to the entry points of telecommuting workers is the interaction risk

False

The process of evaluating internal controls and designing meaningful audit tests is more complex for manual systems than for automated systems.

False

The product development module of an ERP such as SAP might contain such components as production planning, manufacturing execution, operations analysis, and enterprise asset management.

False

The purchasing process starts when the purchase invoice is submitted by the vendor.

False

The purpose of MRP II was to integrate manufacturing, engineering, marketing, finance, and human resources units to run on the same information system.

False

The real-time nature of processing increases the total processing time and precludes immediate feedback to management.

False

The requirements to frequently or infrequently access data are not relevant to the way that the data is stored due to computer access speed.

False

The responsibility for operations, compliance, and financial reporting lies with the auditors.

False

The responsibility of the auditor to search for fraud is less than the responsibility to search for errors.

False

The risk assessment is the foundation for all other components of internal control and provides the discipline and structure of all other components

False

The risks related to computerized systems are adequately covered by the COS internal control report

False

The sale of bonds should be considered a regular, recurring process since these types of transactions are recorded in the general ledger.

False

The same audit tests would test for completeness of a liability or an asset.

False

The segregation of duties states that the authorization of duties is to be separated from the recording function but not from the custody function.

False

The standard form of encryption embedded in e-commerce sites and in web browser software is "Safe Sending Language" (SSL).

False

The steps within the design phase of the SDLC are the same, whether the organization intends to purchase software or to design the software in-house.

False

The supply chain is the linked processes from the raw material vendor through the manufacturer ending at the stage of finished goods.

False

The systems development life cycle is responsible for the oversight and management of the IT governance committee.

False

The three conditions that make up the fraud triangle are theft, concealment, and conversion

False

The three primary components of the logistics function are 1) planning, 2) production, and 3) sales.

False

The use of control totals and related acknowledgments can reduce the risk of denial of service attacks by hackers.

False

The use of passwords to allow only authorized users to log into an IT system is an example of an application control

False

There are a number of methods described that are intended to limit log-ins exclusively to authorized users. The only method that is foolproof is the biometric devices

False

There is not much room for professional judgement when performing audits, as a result of the detailed guidance provided by organizations, such as the PCAOB.

False

Tier one describes software used by midsize businesses and organizations.

False

Tier two includes software often used by large, multinational corporations.

False

To increase the effectiveness of login restrictions, passwords must be unique for each user

False

Traditional EDI is a real-time processing system due to the 24 hour, 7 day a week operation of computers and servers.

False

Traditional accounting software is much more comprehensive and encompassing that ERP software

False

Training of employees will be minimal due to BPR and system's integration.

False

Unethical and fraudulent behaviors are much more likely to be initiated by employees, not management.

False

When ERP implementation is started, all of the legacy system must be replaced for proper operation.

False

When a client changes the type of hardware or software used or in other ways modifies its IT environment, the auditors need to test only the new system in order to determine the effectiveness of the controls.

False

When a client company is using IT outsourcing, and that service center has its own auditors who report on internal control, the third-party report (from the independent auditors) cannot be used as audit evidence without the auditor performing an adequate amount of compliance testing.

False

When a company implements an evaluated receipt settlement results in the increase in the strength of the internal controls.

False

When a credit memorandum has a reference to the original sales invoice and approved price list it will assure that the correct customer receives credit for the return.

False

When a new asset is requested, and the cost is below a preestablished amount, it is necessary for specific authorization of the purchase.

False

When a sales order has been entered into the system, the customer's credit status must be checked. For existing customers, the sale on account should be approved only if the customer has exceeded their credit limit.

False

When an auditor is engaged to audit a company that uses cloud computing, the auditor must rely on the SOC reports provided by the service company's auditors.

False

When data and processing are distributed across several computers, as occurs in a system of distributed processing, the failure of one site will be harmful and bring down the entire system.

False

When the IT governance committee has made the decision as to which IT upgrades and/or modifications are to be made, their job is complete.

False

Whenever a sales order is received, it is necessary to check the inventory to make sure that the items ordered are in stock. If the items are in stock, a packing slip will be prepared.

False

With the proper training of employees and the adequate controls, it would be possible to eliminate all errors

False

Within are relational database a record may have more than one primary key.

False

Which of the following is NOT one of the types of control totals?

Digit Count

A retail store chain is developing a new integrated computer system for sales and inventories in its store locations. Which of the following implementation methods would involve the most risk?

Direct cutover

A system conversion method in which on a chose date the old system operation is terminated and all processing begins on the new system.

Direct cutover conversion

The AICPA's Trust Services Principles practice that states that organizations should receive explicit or implicit consent of the customer before providing information to third parties is under the title of:

Disclosure to third parties

In this type of client-server computing, the client PC participates in application processing - including the updates and changes to data that reside on the server

Distributed application

A set of small databases where data are collected, processed, and stored on multiple computers within a network is a:

Distributed database.

In this type of client-server computing, the client PC manipulates data for presentation but does not do any other significant processing

Distributed presentation

Client-server computing can be divided into two levels. These two levels are known as _________ and ________

Distributed presentation; distributed application

Within the cloud computing environment, the service provider is responsible to make sure that all relevant risks have been identified and controlled. Because of this, the company using the cloud computing does not need to repeat that evaluation

False

This type of external computer fraud is intended to overwhelm an intended target computer system with so much bogus network traffic so that the system is unable to respond to valid traffic

DoS Attack

The documenting system that shows the flow of documents and information among departments or units within an organization is called a:

Document Flowchart

Which of the following is not one of the popular documentation methods for processes and systems presented in the textbook?

Document creation map

The operations list is the:

Document of instructions utilized to assemble a product.

In an audit of financial statement in accordance with generally accepted auditing standards, an auditor is required to:

Document the auditor's understanding of the client company's internal controls.

The detailed examination of documentation that exists about the system to gain an understanding of the system under study is called a(n):

Documentation Review

Within the systems analysis phase of the SDLC, which of the following data collection methods does not involve any feedback from users of the IT system?

Documentation review

Which of the following function to store, index, and provide the IP address for each domain name?

Domain name servers

OLAP tools include all of the following EXCEPT:

Drill up.

This control requires the approval and signature of two authorized persons, on checks over the predetermined threshold amount, which reduces the risk of significant fraud or error.

Dual Signature

All of the following are operation risks of ERP systems except:

Duplicate Information

The internal control process of requiring management approval of fixed asset changes prior to recording the transaction, will help to minimize the risk of:

Duplicate transactions

The use of electronic means to enhance processes is termed:

E-business

What is the main difference between e-business and e-commerce?

E-business refers to all forms of electronic business transactions and processing, whereas e-commerce is a type of e-business specific to online buying and selling

This type of highly integrated IT system incorporates electronic processing of sales-related activities and, generally, the sales processes are transacted over the internet.

E-commerce

Which of the following statements is true?

E-commerce is a subset of e-business.

All of the following are true statements about e-commerce EXCEPT:

E-commerce sales reduce the opportunity for fraud, theft of assets, and theft of data.

Businesses that are purely web-based are called:

E-tailers

Which of the following is not an example of employee fraud?

Earnings management

The act of misstating financial information in order to improve financial statement results is referred to as:

Earnings management.

Advantages of distributed databases include all EXCEPT:

Eased managerial obligations.

The assessment of the costs and benefits associated with the proposed IT system is referred to as:

Economic Feasibility

Typical steps within the systems analysis phase of the SDLC would not include which of the following?

Economic Feasibility

The purpose of this analysis is to determine which of the alternative designs is the most cost effective.

Economic feasibility

One inventory control function that is important to the conversion process is the determination of _______, or the most efficient quantity of products to purchase.

Economic order quantities

Which of the following is not an advantage of using real-time data processing?

Efficiency for use with large volumes of data

When a company has an e-business transaction with a supplier, it could be using

Either the Internet or an extranet.

The company-to-company transfer of standard business documents in electronic form is called:

Electronic Data Interchange

The inter-company, computer-to-computer transfer of business documents in a standard business format is referred to as:

Electronic Data Interchange

One of the newest technologies related to payables is one where invoices are exchanged and payments are made via the internet. The name given to this process is:

Electronic Invoice Presentment and Payment (EIPP)

The intercompany, computer-to-computer transfer of business documents in a standard business format is called:

Electronic data interchange

This type of highly integrated IT system, inter-company, computer-to-computer, communicates sales documents electronically with a standard business format.

Electronic data interchange

This system enables a vendor to present an invoice to its trading partner via the internet, eliminating the paper, printing, and postage costs of traditional paper invoicing

Electronic invoice presentation and payment

Each of the following represents a characteristic of B2B commerce EXCEPT:

Electronic retailing.

An electronic payroll time keeping device that collects time and attendance data when employees enter their time sheets is called:

Electronic time clock

Which of the following is NOT one of the three rules of data normalization?

Eliminate blank fields

An alternative power supply that provides electrical power in the event that a main source is lost is called:

Emergency power supply

One of the most effective ways a client can protect its computer system is to place environmental controls in the computer center. Environmental controls include:

Emergency power supply

With the proper implementation of an ERP system:

Employee IDs, passwords, and segregated duties aid in internal control measures.

The theft of assets by a non-management employee is termed:

Employee fraud

Select the true statement from the following.

Employee fraud is more prevalent in the routine processes. Management fraud is more prevalent in administrative processes and reporting.

According to the authors of this textbook, which of the following is not one of general categories of people who commit fraud?

Employees

A company's internal controls policies may mandate the distribution of paychecks by an independent paymaster in order to determine that:

Employees included in the period's payroll register actually exist and are currently employed.

Which of the following statements is not true with regard to a relational database?

It stores data in a tree formation.

For which of the following computerized conversion systems is Wal-Mart well known?

JIT

This item would include explanations concerning the qualifications and responsibilities of each position shown on organization chart. The item is also supported by policies and procedures manuals that outline specific activities performed by each position.

Job profile

What company developed the first true ERP systems?

Peoplesoft

The first "pure Internet" architecture, with no programming code residing on the client computer was:

Peoplesoft.

There were four market segments identified by the authors in chapter 2. Which of the following is not one of those segments?

Legacy Company Sytems

The modern integrated systems discussed by the authors include different types of architectures or model. Which of the following is not one of those models?

Legacy accounting

An existing system within the organization that uses older technology is called a(n):

Legacy system

Which of the following is not one of the advantages of maintaining the legacy systems?

Legacy systems are inexpensive to maintain

Features that assist management and accountants, as the result of the point-of-sale systems, include all of the following, except:

List prices can be changed by the check-out clerks to take advantage of any price changes.

This type of computer network is one that spans a relatively small are- often confined to a single building or group of buildings, and are intended to connect computers within an organization

Local Area Network

The proper sequence of Internet connectivity between users is:

Local ISP to regional ISP to national backbone provider to network access points to national backbone provider to regional ISP to local ISP.

Which of the following connects individual users to the Internet using dial-up modems, digital subscriber lines, or cable TV lines?

Local ISPs

A computer network covering a small geographic area, which, in most cases, are within a single building or a local group of buildings is called a:

Local area network

When one site is utilized as the pilot approach to ERP, the implementation method is referred to as:

Location-wise implementation

This term relates to making the computer recognize a user in order to create a connection at the beginning of the computer session

Login

The major function within the conversion process is the:

Logistics function.

The process of logical, systematic flow of resources throughout the organization is referred to as

Logistics.

There are two modes of processing transactions in accounting systems. The mode that will record transactions, one at a time, is referred to as:

Online Processing

In order to smooth out the payroll process and avoid the heavy workload that falls at the end of the payroll period, many companies will use this type of system - one that integrates their human resources and payroll functions. This system makes real-time personnel data available and the general ledger and production system can be automatically updated at the end of the payroll period.

Online Software Systems

The risk related to this category of Trust Services Principles is that personal information about customers may be used inappropriately or accessed by those either inside or outside the company

Online privacy

The existence of IT-based business processes often result in details of transactions being entered directly into the computer system, results in a lack of physical evidence to visibly view. This situation is referred to as:

Loss of Audit Trail Visibility

The reconciliation of time sheets with production reports for work-in-process and finished inventories minimizes the related risk of all of the following EXCEPT:

Lost or stolen inventory

Conditions that warrant the need for strong controls relating to the payroll process include all of the following EXCEPT:

Low employee turnover

The original purpose of ARPANET was to share military research data among four universities. Which of the following was not one of the four universities?

MIT

Select the correct statement from those provided below.

MRP II allows interaction between suppliers and their customers via the internet or other electronic means.

Which of the following is NOT one of the three critical actions that a company can undertake to assist with fraud prevention and fraud detection?

Maintain an accounting information system

It is necessary for a company to maintain good control over their accounts payable and paying by the due date, for all of the following reasons, except:

Maintain relationships with customers

The planning component of the logistics function has all of the following elements except:

Maintenance and control.

The process that is concerned with maintaining the capital resources used to support production is referred to as:

Maintenance and control.

Within the cash disbursement process, specific steps should be taken to enhance the effectiveness and efficiency of making payments to vendors. Which of the following is NOT one of those steps?

Maintenance of the general ledger

When an organization hires consultants to assist with any phase or any phases of the SDLC, there are at least four ethical obligations. Which of the following is not one of those obligations?

Make an honest effort to participate, learn the new system processes, and properly use the new system.

Which individual or group has the responsibility to establish, enforce, and exemplify the principles of ethical conduct within an organization?

Management

Claims regarding the condition of the business organization and in terms of its operations, financial results, and compliance with laws and regulations, are referred to as:

Management Assertions

Internal controls can be effective in preventing or detecting all of the following types of fraud except:

Management Fraud

Management circumvention of systems or internal controls that are in place is termed:

Management override

Some of the AICPA trust services principles may include:

Management, choice & consent, use & retention, access, disclosure to third parties, and monitoring & enforcement.

The AICPA's Trust Services Principles practice that states a specific person or persons should be assigned the responsibility to insure that privacy practices are followed by employees is under the title of:

Management.

Internal control activities within the payroll process, identified as authorization, would include which of the following?

Manager approval of payroll prior to signing checks

Select the true statement from those listed below.

Managers need the information associated with their area of responsibility.

Select the true statement from those provided below.

Managers require access to historical data this is generally not available to other individuals.

Hierarchical databases are NOT:

Many-to-one relationships.

Accounting software traditionally uses two different types of files. The file type that is relatively permanent and used to maintain the detailed data for each major process is a(n):

Master File

The chart of accounts would be a good example of a:

Master File

When a vendor returns a request for proposal, it will include all of the following, except:

Match of the system and user needs

All of the following are disadvantages of e-commerce EXCEPT:

Faster order processing prevents good assurance of order correctness.

The realistic possibility of affording, implementing, and using the IT systems being considered is referred to as:

Feasibility

When high-dollar fixed assets are purchased, there should be a strict approval process which would include three formal steps. Which of the following is not one of those steps?

Feasibility study.

All of the following are disadvantages to a cloud-based system except:

Fewer IT employees would be needed to maintain the system

The separation of the responsibility for the authorization of new customers from the custody of inventory will help to minimize the related risk of:

Fictitious customers

The internal control activity requiring that the manager approves payroll prior to signing paycheck is intended to minimize the risk of:

Fictitious employee

The internal control activity requiring the preparation of a bank reconciliation will minimize the risk of all of the following EXCEPT:

Fictitious employees

The internal control process of requiring an independent paymaster, will help to minimize the risk of:

Fictitious employees

The internal control process of separating the custody of inventory from the accounts payable record keeping will help to minimize the risk of:

Fictitious purchases

The internal control process that requires the segregation of the authorization of purchase returns and the accounts payable record keeping and the custody of inventory, will help to minimize the risk of:

Fictitious returns

Which programmed input validation check determines whether the appropriate type of data, either alphabetic or numeric, was entered?

Field check

Each record is made up of related:

Fields

Internal control activities within the purchasing process, identified as adequate records and documents, would include which of the following?

Files are to be maintained for purchase requisitions, purchase orders, receiving reports, and invoices.

Uploading data is putting:

Files from each HIP system into the data warehouse.

The correct statement regarding the supply chain and B2C is the supply chain extends from the secondary supplier and ends with the:

Final customer while B2C is from the retailer to the final consumer.

This type of audit is completed to determine whether or not the client has prepared and presented its financial statements fairly, in accordance with established financial accounting criteria.

Financial Statement Audit

The first part of the strict approval process for high-dollar fixed assets is the investment analysis. Which of the following is part of that analysis?

Financial justification

The bill of materials is the:

Form that specifies the components of a product.

The theft, concealment, and conversion of personal gain of another's money, physical assets, or information is termed:

Fraud

General controls are divided into five broad categories. Which of the following is not one of these categories?

Fraud Prevention

The audit is to be performed by a person or persons having adequate technical training and proficiency as an auditor. This is one of the generally accepted auditing standards that is part of the:

General Standards

The ________ provide(s) details for all the account within the chart of accounts and is the entire set of T-accounts for the organization.

General ledger

The ten standards that provide broad guidelines for an auditor's professional responsibilities are referred to as:

Generally accepted auditing standards

Which of the following is least likely to be part of an accounting information system function

Generation of data to be part of the information system

An entity who receives a paycheck, but who does not actually work for the company is called:

Ghost employee

The purpose of the data warehouse does NOT include:

Giving managers rich sources of current trends and data.

The purpose of tracing sales invoices to shipping documents would be to provide evidence that:

Goods billed to customers were shipped.

This type of auditor conducts audits of government agencies or income tax returns.

Government Auditor

Which of the following would be a correct way to compute the net pay for an employee?

Gross Pay minus Authorized Deductions

Which of the following statements is true of unstructured data? 1. Unstructured data does not easily fit into rows and columns of fixed length 2. An example of unstructured data is the free-form text of an online customer's review of a product 3. Accounting data is unstructured data 4. An example of unstructured data would be a 10-digit phone number

Only 1 & 2.

Unethical or fraudulent behavior within the administrative process 1. Can occur in administrative processing of an organization. 2. Can occur in the reporting functions of an organization. 3. Are much more likely to be initiated by management. 4. Are much more likely to be initiated by employees.

Only 1, 2, and 3 are correct.

The external general purpose financial statements/reports are the: 1. Aged accounts payable report. 2. Aged accounts receivable report. 3. Balance sheet. 4. Income statement. 5. Inventory statement. 6. Statement of cash flows. 7. Statement of retained earnings.

Only 3, 4, 6, and 7.

Companies that engage in e-commerce, B2C sales with consumers:

Have the same kind of obligations to conduct their business ethically as companies transacting business any other way.

The independence of a CPA could be impaired by:

Having the ability to influence the client's decisions

This section of the common forms used as the standard format in EDI data transmission contains data about the file or transmission and identify the end of a particular transaction.

Header and Trailer Data

Internet EDI, or EDIINT, features all of the following EXCEPT:

Heavy infrastructure.

Today's automated accounting process:

Helps the user by identifying modules for activities.

Select the true statement from the following.

High-impact processes (HIPs) and user's needs determine the data in the data warehouse.

A backbone provider is an organization that provides:

High-speed access to regional ISP users.

All of the following steps come after the evaluation of RFPs and Software in the system design process except:

Hiring a consultant

To fulfill the management obligations that are an integral part of IT governance, management need not focus on:

Hiring an acceptable IT manager

A consulting firm helping a company with the implementation of an ERP system will typically perform all of the following actions except:

Hiring specialized technicians to maintain the system

When accounting software is used to prepare the periodic payroll, which of the following items is necessary to input for each employee?

Hours Worked

Business process reengineering means:

Matching the IT and business processes to achieve the greatest mutual benefit from each.

_________________ involves the automated scheduling of production orders and movement of materials in the production process.

Material resource planning (MRP)

During the planning phase of the audit, auditors estimate the monetary amounts that are large enough to make a difference in decision making. This amount is referred to as:

Materiality

Whenever a company grants credit to customers, there is a danger that customers will not pay. In fact, most companies have occasional problems with customers who fail to pay which leads to writing off the accounts receivable. Proper controls related to these uncollectible accounts include all of the following, except:

Mathematical verification of the cash receipts journal and the accounts receivable ledger.

In a properly controlled system of administrative and reporting functions, 1. Employees have access to related assets or source documents. 2. Administrative processes are tightly controlled by supervisors. 3. Employees have the authority to initiate processes such as investing. 4. On processes such as sales and cash receipts employees are given general authorization to initiate and process transactions.

Only 4 is true.

Detailed information from a sale may be used by: 1. The sales department. 2. The accounts receivable section. 3. The inventory department. 4. General ledger accountants. 5. Customer service.

Only by 1, 2, 3, and 5.

Posting to the general ledger occurs:

Only when proper authorization has been given.

Before forwarding customer data, an organization should receive explicit or implicit consent of the customer. This describes which of the AICPA Trust Services Principles online privacy practices?

Onward transfer and disclosure

A Data Flow Diagram is used by systems professionals to show the logical design of a system. The advantage of the method is that it uses only four symbols. The symbol used to represent a data store or the storage of data is a(n):

Open-ended rectangle

The software that controls the basic input and output activities of the computer are called:

Operating System

The types of concepts commonly found in a code of ethics would not include:

Operating at a profit in all reporting periods

During this phase of the SDLC, management should request and receive ongoing reports about the performance of the IT system.

Operation and Maintenance

The regular, ongoing, functioning of the IT system and the processes to fix smaller problems, or bugs, in the IT system is called:

Operation and Maintenance

This type of audit is completed to assess the operating policies and procedures of a client for efficiency and effectiveness.

Operational Audit

Which of the following types of audits is most likely to be conducted for the purpose of identifying areas for cost savings?

Operational Audits

This type of database contains that data that are continually updated as transactions are processed and includes data for the current fiscal year and supports day-to-day operations is referred to as a(n):

Operational Database

The assessment of the realism of the possibility that the current employees will be able to operate the proposed IT system is referred to as:

Operational Feasibility

During this process, the project team must consider the number of employees, their capabilities and expertise, and any supporting systems necessary to operate each alternative design.

Operational feasibility

The form that describes the chain of events that constitute a product's production is referred to as the:

Operations list.

All of the following are reasons why it is not possible to eliminate all fraud risks, except

Opportunity

Circumstances that provide access to the assets or records that are the objects of the fraudulent activity describes which condition of the Fraud Triangle?

Opportunity

The ERP program that uses the term "back office" in reference to managerial functions and "front office" in reference to customer and sales functions is:

Oracle Applications

The Point-of-sales (POS) systems capture all relevant sales data at the point of sale - the cash register. The data that is captured includes all of the following, except:

Ordering for low-inventory items

The document is prepared in order to map out the jobs and reporting relationships within an organization. This may include only top branches of an organization or may include all positions within the company.

Organization Chart

This type of address is the unique information that allows a specific website or server to be located.

IP

This type of auditor specializes in the information systems assurance, control, and security. They may work for CPA firms, government agencies, or with the internal audit group.

IT Auditor

Which of the following is not one of the three primary types of audits?

IT Audits

Many companies use independent, internet-based service providers to handle their payroll processing. These payroll providers specialize in offering solutions and constant access to payroll information.

Outsourcing of Payroll Services

Internal control activities within the payroll process, identified as adequate records and documents, would include which of the following?

Paychecks are prepared on prenumbered checks

Which of the following is not an independent check within payroll processes?

Paychecks are prepared on prenumbered checks.

This individual is responsible for distributing the signed paychecks on the designated pay day.

Paymaster

Common expenditure processes would include all of the following, except:

Payment received on account

This record, prepared by the cash disbursements department, provides a listing of al paychecks written, in check-number sequence, with the total supporting the amount of payroll funds to transfer to the payroll bank account.

Payroll Disbursements Journal

An integrated IT system of payroll and human resources may have extra risks above those of a manual system. Passwords and access logs are controls that should be used in these integrated systems to lessen the risk of:

Payroll data that does not reconcile to time cards.

Internal control activities within the payroll process, identified as segregation of duties, would include which of the following?

Payroll preparation, authorization of new hiring and pay rates, information systems, and general accounting should all be performed by different departments and / or different people.

A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise's goals by adding value while balancing risk versus return over IT and its processes is called:

IT Governance

The proper management, control, and use of IT system are known as:

IT Governance

A group of senior managers selected to oversee the strategic management of IT is called:

IT Governance Committee

The two broad categories of general controls that relate to IT systems include which of the following:

IT administration and the related operating systems development and maintenance processes

The policies and procedures that employees following in acquiring and maintaining human resources, capturing and maintaining employee data, paying employees for time worked, and recorded the related cash payroll liabilities and expenses are collectively referred to as:

Payroll processes

This record, prepared by the payroll department, is a complete listing of salary or wage detail for all employees for a given time.

Payroll register

This document authorizes the transfer of cash from the company's main operating account into the payroll cash account.

Payroll voucher

Intentionally attempting to circumvent IT system access controls to determine whether there are weaknesses in any controls is called:

Penetration testing

The process of legitimately attempting to hack into an IT system to find whether weaknesses can be exploited by unauthorized hackers is referred to as:

Penetration testing

These tests of the security controls involve various methods of entering the company's system to determine whether controls are working as intended.

Penetration tests

Which of the following is a general control to test for external access to a client's computerized systems?

Penetration tests

The rule in the PCAOB/AICPA Code of Professional Conduct that is referred to as Responsibilities, can be stated as:

In carrying out their professional duties, CPAs should exercise sensitive professional and moral judgments in all their activities.

Which of the following is not considered a benefit of using computerized conversion systems?

Increased sales and cost of sales

Management misstatement of financial statements often occurs in order to receive indirect benefits such as:

Increased stock prices

Which control activity is intended to serve as a method to confirm the accuracy or completeness of data in the accounting system?

Independent checks and reconciliations

The theft of proprietary company information, by digging through the trash of the intended target company is called what?

Industrial Espionage

The chance that information used by decision makers may be inaccurate is referred to as:

Information Risk

This organization issues guidelines for conducting the IT audit. The standards issued address practices related to control and security of the IT system.

Information Systems Audit and Control Association

Using IT systems to enhance efficiency and effectiveness of internal or supply chain processes is called:

Information Technology Enablement

Which of the following is not one of the advantages of batch processing?

Information can be provided to users on a timely basis

Which of the following best describes the relationship between data and information?

Information is interpreted data.

This type of auditor is an employee of the company he / she audits.

Internal Auditor

The COSO report is also known as:

Internal Control Integrated Framework

The COSO report written for the purpose of assisting managers in the challenge of managing risk in their organization is entitled:

Internal Control- Integrated Framework

A company's _______ encompasses the tone of an organization and sets the basis for how risk is viewed and addresses by an entity's people

Internal Environment

The primary objective of compliance testing in a financial statement audit is to determine whether:

Internal controls are functioning as designed.

Many different types of output are generated by an accounting information system. The authors identified general categories of output. The category that would include any document that management determines would be useful to the business is:

Internal reports

This organization was established by the IFAC to set International Standards on Auditing (ISAs) that contribute to the uniform application of auditing practices on a worldwide basis.

International Auditing and Assurance Standards Board (IAASB)

Which of the following is NOT one of the approaches to cloud computing?

Internet Clouds

What does IP stand for?

Internet protocol

Information is the:

Interpretation of data that have been processed.

Face-to-face, verbal questioning of users of an IT system to determine facts or beliefs about the system are called:

Interviews

Specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts is called:

Intrusion detection

This type of software alerts the organization to hacking or other unauthorized use of the system or network.

Intrusion detection

Input controls such as field check, validity check, limit check, and reasonableness check are useful in IT systems of purchase to lessen which of the following risks?

Invalid data entered by vendors

IT controls over computer records and physical controls in general ledger storage areas minimize the related risk of:

Invalid general ledger postings

The internal control process that requires the approval of a cash disbursement transaction to take place prior to the preparation of the check, will help to minimize the risk of:

Invalid payments

The internal control process that requires purchase records to be matched and verified for item descriptions, quantities, dates, authorized prices, and mathematical accuracy, will help to minimize the risk of:

Invalid purchases

The internal control process that requires the approval of the purchase return transaction take place before the preparation of the debit memo, will help to minimize the risk of:

Invalid returns

The separation of the custody of inventory from the accounts receivable record keeping will help to minimize the related risk of:

Invalid returns

The risks that may affect the revenue and cash collection processes include all of the following, except:

Invalid transactions may have been omitted from the records.

The financials module of an ERP such as SAP would include all of the following components EXCEPT:

Inventory

All of the following are General controls except for:

Inventory Controls

The responsibility for managing and recording the movement of inventory in the many different directions that it may go throughout the conversion process is assigned to the:

Inventory control department.

The four primary functions of corporate governance do not include:

Inventory control.

Which of the following is NOT a special journal?

Inventory journal.

In following proper segregation of duties, those who handle cash should not be granted any of the following authorities EXCEPT:

Inventory management duties

Which of the following is not one of the general categories of business processes?

Inventory processes

The _______ function concerns the control of raw materials inventory held in storage or in holding areas, waiting for processing.

Inventory stores

Select the true statement from the choices below.

Inventory stores are concerned with raw materials and warehousing is concerned with finished goods.

When a point of sale system is used and a customer checks out through a cash register, which of the following processes occurs?

Inventory values are updated

Which of the following involves managing the holding area for finished goods awaiting sale?

Inventory warehousing

The account that a manufacturing operation and a retail firm would have in common would be:

Inventory.

The authors presented their "picture" of internal control as a series of umbrellas which represent different types of controls. Which of the following is not one of those types of controls?

Investigation

The IT Governance Committee has several important responsibilities. Which of the following is not normally one of those responsibilities?

Investing excess IT funds in long-term investments

Which of the following statements is false?

New programs sold by software development companies are not as user friendly as the legacy systems

Output from an accounting information system would NOT include:

Invoices from vendors

Perpetual inventory systems:

Involve every level of inventory necessary for production.

XBRL:

Is a language that allows data extraction from financial statements.

The Internet:

Is a series of networks connected to provide a global connectivity.

Which of the following questions would be least likely to appear on an internal control questionnaire regarding the initiation and execution of new property, plant, and equipment purchases?

Is access to the assets restricted and monitored?

SSL - secure sockets layering:

Is an encryption system in which the web server and the user's browser exchange data in encrypted form.

The supply chain:

Is both an internal and external process.

Today's automated accounting process:

Is built on an operational structure similar to manual accounting.

Security of source documents:

Is essential for both manual general ledger systems and IT accounting systems.

A router:

Is hardware that connects two or more networks.

The loss of transaction processing efficiency:

Is minimized because of the increased computing power available.

Which of the following companies would be most likely to use a Tier Two ERP software?

None of the Above

Hacking can be prevented by using which of the following?

None of the above

What time frame is required for a business processing system to be considered a "legacy system"?

None of the above

Which of the following statements is FALSE?

None of the above are false.

Notable differences between the acquisition of fixed assets and the acquisition of inventory includes:

None of the above.

The most difficult type of misstatement to discover is fraud that is concealed by:

Nonrecorded transactions

This term means that a user cannot deny any particular act that he or she did on the IT system is referred to as:

Nonrepudiation

Which of the following statements is true?

Nonroutine transactions are entered in the general journal.

Data within the data warehouse is:

Nonvolatile - it does not change rapidly.

The AICPA's Trust Services Principles practice that states a company should have policies and practices to maintain the privacy of customer data is under the title of:

Notice

Watching the steps that employees take as they process transactions in the system is referred to as:

Observation

Which of the following procedures would be most useful in determining the effectiveness of a company's internal controls regarding the existence or occurrence of payroll transactions?

Observe the segregation of duties concerning personnel responsibilities and payroll disbursement.

Which of the following audit procedures is most likely to be performed during the planning phase of the audit?

Obtain an understanding of the client's risk assessment process.

Batch processing:

Occurs when similar transactions are grouped together and processed as a group.

Real-time processing:

Occurs when the transaction is processed immediately.

Assets to be included in the fixed asset pool would include all of the following, except:

Office Supplies

A company's conversion processes includes all of the following except:

Office supplies.

The decision to raise or acquire capital funds is:

Is the responsibility of the board of directors.

E-commerce:

Is the sale of goods or services to an end-user consumer.

Direct access:

Is the same as random access.

Drill down within OLAP is:

Is the successive expansion of data as lower levels of data are exposed.

The chance for fraud or ethical lapses will not be reduced if management:

Is unethical

Routing is the:

Issuance and movement of materials into the various production phases.

Select the correct statement from those listed below.

Issuance of bonds and the origination of loans are considered debt while the issuance of stock is considered equity.

Which of the following statements concerning an operations list is true?

It is an engineering document that describes the chain of events within a company's conversion process.

The use of the smart card or security tokens is referred to as a two factor authorization because:

It is based on something the user has, the token or card, and something the user knows, the password

Which of the following is a disadvantage of purchased accounting software, compared with software developed in-house?

It is custom designed for that company

Payroll outsourcing has become popular due to all of the following reasons EXCEPT:

It offers full protection from internet fraud

Which of the following relationships does not violate the rules of segregation of duties

Preparation of the sales order and sales invoice.

Which of the following correctly lists activities within the conversion process in chronological order?

Prepare bill of materials, prepare purchase requisition, initiate production, inspect goods

Bar codes can be used in a number of different instances for input:

Prepare financial staments

Which of the following correctly lists the correct chronological order of data flow in the fixed asset acquisitions process?

Prepare requisition; approve purchase; prepare purchase order; receive goods

Which of the following objectives were not identified as necessary to be provided by an effective accounting system?

Prepare the appropriate documents

In a system of proper internal controls, the same employee should not be allowed to:

Prepare voucher packages and sign checks.

Inventory status reports are:

Prepared at various stages of the production process.

Personnel who work in the receiving area should complete all of the following processes, except:

Preparing an invoice

The recording responsibilities for cash receipts includes all of the following, except:

Preparing bank deposits

A large part of the work performed by an auditor in the audit planning process is the gathering of evidence about the company's internal controls. This can be completed in any of the following ways, except:

Preparing memos to summarize their findings

In order to ensure that all records are updated only for authorized transactions, appropriate individuals should be assigned all of the following duties, except:

Preparing the bank reconciliation.

The establishment of log-in procedures can help prevent or lessen security risks and are referred to as:

Preventive controls

Sales orders are calculated based on current selling prices of the items sold. The source of these prices, which would include the entire set of pre-established and approved prices for each product, is referred to as a(n):

Price list

All types of auditors must follow guidelines promoting ethical conduct. For financial statement auditors, the PCAOB/AICPA has established a Code of Professional Conduct, commonly called the Code of Ethics, which consists of two sections. Which of the following correctly states the two sections?

Principles and rules

The purpose of the feasibility study is to assist in

Prioritizing IT requested changes

To avoid the risks associated with a public cloud, many companies establish their own computing cloud structure. The cloud is developed, owned, maintained, and used by the user company. This cloud is referred to as:

Private cloud

An extranet is a:

Private network accessible by select members of the supply chain.

An intranet is a:

Private network accessible only to the employees of a company.

When creating or reading a system flowchart, the rectangle represents a(n):

Process

A pictorial representation of business processes in which the actual flow and sequence of events in the process are presented in the diagram form - the start of the process, the steps within the process, and the finish of the process is referred to as:

Process Map

In documenting systems, which pictorial method is described as a method that diagrams the actual flow and sequence of events?

Process map

The policies and procedures that employees follow when completing the purchase of goods or materials, capturing vendor data and purchase quantities, and routing the resulting purchasing documents to the proper departments within the company are called:

Processes

These controls are intended to prevent, detect, or correct errors that occur during the processing of an application

Processing Controls

This type of control is intended to ensure the accuracy and completeness of processing that occurs in accounting applications:

Processing Controls

The accuracy, completeness, and timeliness of the process in IT systems is referred to as:

Processing Integrity Risks

IT audit procedures typically include a combination of data accuracy tests where the data processed by computer applications are reviewed for correct dollar amounts or other numerical values. These procedures are referred to as:

Processing controls

AICPA Trust Principles identify five categories of risks and controls. Which category is best described by the statement, "Information process could be inaccurate, incomplete, or not properly authorized"?

Processing integrity

The risk related to this category of Trust Services Principles could be inaccurate, incomplete, or improperly authorized information

Processing integrity

When a company sells items over the Internet, it is usually called e-commerce. There are many IT risks related to Internet sales. The risk of invalid data entered by a customer would be a(n):

Processing integrity risk.

In today's IT environment:

Processing speed is compromised for query capability with relational databases.

The sales and services module of an ERP such as SAP would include all of the following components EXCEPT:

Procurement

Credit cards given to employees by the organization in order for the employees to make designated purchases are called:

Procurement Cards

Which of the following is NOT a primary component of the logistics function?

Production

Which of the following is not a method of unethically inflating sales revenue?

Promotional price discounts

An example of an independent verification in the sale process is:

Proof of recorded dates, quantities, and prices on an invoice.

One of the most effective ways a client can protect its computer system is to place physical controls in the computer center. Physical controls include all of the following, except:

Proper temperature control

Regional ISPs:

Provide the connection between local ISPs and national backbone providers.

This form is prepared to document the need to make a purchase and requests that the specific items and quantities be purchased.

Purchase requisition

Internal control activities within the purchasing process, identified as segregation of duties, would include all of the following, except:

Purchasing records and programs must be protected from unauthorized access.

Which of the following is not an example of cloud computing?

Purchasing songs from iTunes and downloading those those songs onto your computer

The final hub in the logistics function is:

Quality control.

The final hub in the logistics function which involves a follow-up to production, where the products are inspected before they are moved to the warehouse or shipping area is referred to as:

Quality control.

The AICPA's Trust Services Principles practice that states that all customer data collected remains "accurate, complete, current, relevant, and reliable" is under the title of:

Quality.

A written, rather than an oral, form or questioning of users to determine facts or beliefs about a system is referred to as a(n):

Questionnaire

The organization of files in a computer system normally uses one of two different access methods. The access method method where the files are not stored in sequence, one record not stored immediately after another, is referred to as:

Random Access

(Magnetic) Disk storage is:

Random access.

Physical inventory counts should only include:

Raw materials, work-in-process, and finished goods.

During substantive testing, if material misstatements have been found to exist, which of the following actions should be taken next?

Re-evaluate the audit risk in the planning phase

The management assertion related to valuation of transactions and account balances would include all of the following, except:

Real

A type of online processing where a transaction is processed immediately so that the output is available immediately is termed:

Real-Time Processing

The processing system where transactions are processed immediately and where output is available immediately is referred to as:

Real-time processing

Select the true statement from those provided.

Real-time processing fails to attain the efficiency of batch processing.

Select the false statement from those provided.

Real-time processing must use sequential storage concepts.

This level of assurance means that controls achieve a sensible balance of reducing risk when compared with the cost of the control

Reasonable assurance

Which programmed input validation check compares the value in a field with related fields which determine whether the value is appropriate?

Reasonableness check

Under a system of sound internal controls, if a company sold defective goods, the return of those goods from the customer should be accepted by the:

Receiving Clerk

The textbook referred to the three primary categories of processes in the typical purchasing system. Which of the following in not one of those categories?

Receiving Processes

A document prepared that lists the chronological sequence of all returned items is referred to as a(n):

Receiving log

This document, prepared and maintained by the receiving department, is a sequential listing of all receipts.

Receiving log

A source document prepared by the personnel in the receiving dock that documents the quantity and condition of the items received is called a(n):

Receiving report

Work steps that are internal controls within the business process would include:

Reconciling a cash register at the end of each day

A set of related fields is referred to as a:

Record

The authorization of sales returns requires that certain individuals within the company be assigned the authority for all of the following, except:

Record the Credit Memos

The AICPA Trust Services Principles categorizes IT controls and risks into categories. Which of the following is not one of those categories?

Recovery

Which of the process map symbols is used to show a task or activity in the process?

Rectangle

A Data Flow Diagram is used by systems professionals to show the logical design of a system. The advantage of the method is that it uses only four symbols. The symbol used to represent any task or function performed is a(n):

Rectangle with rounded corners

Which of the following advantages is least likely to be experienced by a company implementing an enterprise resource planning (ERP) system?

Reduced cost

IT systems permit or allow all of the following except:

Reduced internal security measures.

The advantages and disadvantages of modular implementation are:

Reduces the risks associated with installation and operation of the system, but full system integration is not available.

Many IT systems have redundant data storage such that two or more disks are exact mirror images. This is accomplished by the use of:

Redundant arrays of independent disks

Each of the following is an online privacy practice recommended by the AICPA Trust Services Principles Privacy Framework except:

Redundant data should be eliminated from the database.

The Sarbanes-Oxley act was passed in 2002 as a Congress's response to the many situations of fraudulent financial reporting discovered during 2001. The intention of the Act was:

Reform accounting, financial reporting, and auditing functions of companies that are publicly traded

The difference between a general authorization and a specific authorization is that with a general authorization, a transaction is allowed if it falls within specified parameters, whereas with a specific authorization, explicit authorization is needed for that singe transaction to be completed

True

The differentiating factor between B2C and B2B is where B2C might purchase two books; a B2B purchase might involve ten thousand books.

True

The exact steps in the SDLC and/or their sequence are not as important as is the need to formalize and conduct those steps completely and consistently.

True

The existence of good internal controls do not ensure high sales and profits.

True

The face-to-face nature of an interview is advantageous due to the fact that the interviewer can clear up any misunderstandings as they occur and can follow up with more questions, depending on the response of the interviewee.

True

The form authorization and control includes the requirement that source documents should be prenumbered and are to be used in sequence

True

The intent of an ERP (enterprise resource planning) system is to provide a single software application for revenue, expenditures, conversion, and administrative processes.

True

The internal control activity, related to the authorization of transactions, requires that only specific individuals within the company should have the authoritative responsibility for establishing sales prices and credit terms.

True

The last step of the systems analysis phase is to prepare a systems analysis report that will be delivered to the IT governance committee.

True

The longer the encryption key is bits, the more difficult it will be to break the code

True

The longest and most costly part of the SDLC is the operation and maintenance.

True

The most common method for decision makers to reduce information risk is to rely on information that has been audited by an independent party.

True

The most common method for detecting occupational fraud is a tip - from an employee, a customer, vendor, or anonymous source

True

The most effective measure to prevent management fraud is to establish a professional internal audit staff that periodically checks up on management and reports directly to the audit committee of the board of directors

True

The organization should institute procedures to insure that all customer data collected retains accuracy, is complete, is current, is relevant, and is reliable".

True

The paymaster should be independent from the departmental supervision responsibilities, so that it can be determined that the paychecks are being distributed to active employees.

True

The payroll process starts when an employee is hired by the organization.

True

The purpose of observation in the system survey is to enable the project team to gain an understanding of the processing steps within the system.

True

The real-time nature of processing decreases the total processing time and allows more immediate feedback to management.

True

The remittance advice sent by the customer with the related payment is used by the vendor to properly apply the payment to the customer's account.

True

The remoteness of information, one of the causes of information risk, can relate to geographic distance or organizational layers.

True

The research and development effort is part of the planning process rather than the operations process.

True

The rethinking and designing that occur during business process reengineering are aided by the use of information technology

True

The risk related to confidentiality category of Trust Principles is that confidential information about the company or its business partners may be subject to unauthorized access during its transmission or storage in the IT system

True

The role of the auditor is to analyze the underlying facts to decide whether information provided by management is fairly presented.

True

The strength of Peoplesoft is the human resources aspects of an organization.

True

The supply chain may be larger at either or both ends as more than one vendor may supply the same materials and more than one customer may purchase the finished products.

True

The tone at the top of the organization tends to flow through the entire organization and affects behavior at all levels

True

The use of a blind purchase order forces the receiving clerk to perform an independent check of the quantity and quality of the delivery.

True

The use of dual firewalls - one between the internet and the web server and one between the web server and the organization's network - can help prevent unauthorized from accessing the organization's internal network of computers

True

The use of estimates when accounting for fixed assets requires that the estimates may need to be changed as time passes and new information is discovered.

True

The use of generalized audit software is especially useful when there are large volumes of data and when there is a need for accurate information.

True

The use of passwords to allow only authorized users to log into an IT system is an example of a general control

True

The user ID and password for a particular user should not allow access to the configuration tables unless that user is authorized to change the configuration settings

True

The workstations and the network cabling and connections represent spots were an intruder could tap into the network for unauthorized access

True

Those who handle cash should not have access to the related accounting records.

True

Tier one includes software often used by large, multinational corporations.

True

Tier two describes software used by midsize businesses and organizations.

True

To "drill down" is the process of successive expansion of data into more detail, going from high- level data to successively lower levels of data.

True

To database user, the question of how or where data is stored continues to be less important.

True

To increase the effectiveness of login restrictions, user Ids must be unique for each user

True

To set a proper ethical tone, top managements should measure several factors of managerial performance without over-emphasizing profitability or cost cutting.

True

To the extent possible, IT systems should be installed in locations away from any location likely to be affected by natural disasters

True

To verify the accuracy of application software, an organization should be sure the software is tested before it is implemented and must regularly test it after implementation

True

Tools commonly used in data mining are OLAP, ROLAP, and MOLAP.

True

Unauthorized access is a concern when an IT system is networked to either internal networks or the Internet

True

Using a unique service set identifier (SSID) makes it more difficult for an outsider to access the wireless network

True

What a customer refers to as a purchase order is referred to as a sales order by the vendor.

True

When an automated matching system is used, all of the relevant files must be online (or in databases). The system can then access the online purchase order and receiving files and check the match of items, quantities, and prices.

True

When an organization uses a separate checking account to handle payroll transactions, it is easier to account for the payroll transactions and to distinguish them from cash disbursements for other business purposes.

True

When files are organized as sequential access, and the user needs to access record number 250, the previous 249 records will be read by the computer before reading record number 250

True

When management does not act ethically, fraud is more likely to occur

True

When preparing the cash disbursement journals, it is important that the records have the actual date of cash disbursement, as is shown on the check.

True

When the IT governance committee uses both the strategic match and the feasibility study, they will be better able to prioritize proposed changes to the IT systems.

True

When the company is a vendor, goods flow into the company and cash is paid out.

True

When top management behaves ethically and encourages ethical behavior, there are usually fewer cases of frauds, errors, or other ethical problems.

True

While it is not necessary to hire a consulting firm, many organizations find that the special expertise of consulting firms is most beneficial in the design and implementation of accounting system software.

True

While there is no requirement to disclose a privacy policy on a website, it is an ethical obligation to disclose and follow the policy.

True

Within an ERP system unauthorized access to a purchase module could trigger a related unauthorized payment within accounts payable.

True

XML is a rich language that facilitates the exchange of data between organizations via web pages.

True

Y2K compatibility issues arose because computers kept dates in mm/dd/yy type formats.

True

An output of the accounting system that can be used as an input in a different part of the accounting system is referred to as:

Turnaround document

A flat file database has:

Two dimensions, rows and columns.

Relational databases are:

Two-dimensional tables which can be joined in many ways.

This type of question is completely open ended, and the respondent is free to answer in any way that he/she feels addresses the question.

Unstructured Question

Which of the following controls is not normally performed in the accounts payable department?

Unused purchase orders and receiving reports are accounted for.

The business processes that are common in company-to-company sales business types include all of the following, except:

Update affected records, such as accounts payable and cash

An enterprise resource planning (ERP) system would:

Update both accounts payable and inventory when purchased goods are received from a vendor.

The last event to occur in the purchase return process is:

Update inventory records

The custody responsibilities for cash receipts includes all of the following, except:

Updating accounts receivable records

Activities involved with the fixed assets continuance phase of the fixed assets processes include all of the following, except:

Updating depreciation prior to the disposal of fixed assets

The AICPA's Trust Services Principles practice that states the organization should use customers' personal data only in the manner described in "notice" is under the title of:

Use and retention

Independent checks on the performance of others is one of the categories of internal control. These independent checks would include all of the following, except:

Use of appropriate ID to enter restricted areas

Fraud associated with the capital and investment process is:

Usually related to management fraud.

Which of the following statements, related to a business process, is not a true statement?

Usually takes a long-period of time to complete

Capital is/are the funds:

Utilized to acquire long-term assets

The Internet:

Utilizes the World Wide Web as a backbone.

There are many risks that may affect the payroll and fixed asset transactions. Which of the following is not one of those risks?

Valid expenditures recorded properly by the wrong employee.

This type of input validation check examines a field to ensure that the data entry in the field is valid compared with a preexisting list of acceptable values

Validity Check

In entering client contact information in the computerized database of a telemarketing business, a clerk erroneously entered nonexistent area codes for a block of new clients. This error rendered the block of contacts useless to the company. Which of the following would most likely have led to discovery of this error into the company's computerized system?

Validity check

Which of the following items is not one of the source document controls?

Validity check

Because it can be expensive to develop and maintain a system that links two companies directly, the companies often use a third-party network. This third-party network provides other valuable services such as translation and encryption of the EDI data and authentication of a valid and authorized training partner. These third-party networks are called:

Value Added Networks

Internal reports of financial information:

Vary by the user.

Which of the following is NOT generally an area of measure in a balanced scorecard?

Vendor

The review of amounts charged to the company from a seller that it purchased from is called a:

Vendor audit

The expected cost based on projections of a product's required resources which includes direct materials, direct labor and overhead is referred to as:

Standard costs.

Which of the following is not a part of general accepted auditing standards?

Standards of Information Systems

The careful and responsible oversight and use by management of the assets entrusted to management is called:

Stewardship

The careful and responsible oversight and use of the assets entrusted to management is referred to as:

Stewardship

The careful and responsible oversight and use of the assets entrusted to management is called:

Stewardship

Capital funds are acquired through the issuance of:

Stocks and/or bonds.

Equity is considered:

Stocks.

The internal control process of requiring physical controls in the warehouse and receiving areas, in order to limit access to inventory items, will help to minimize the risk of:

Stolen goods

The internal control process that requires physical controls in the warehouse and shipping areas with access to inventory helps to minimize the risk of:

Stolen goods

The internal control process that requires the performance of end of period review to determine whether purchases are recorded in the proper period will help to minimize the risk of all of the following EXCEPT:

Stolen goods

Which of the following terms relates to the control of materials being held for future production?

Stores

The process of determining the strategic vision for the organization, developing the long-term objectives, creating the strategies that will achieve the vision and objections, and implementing those strategies is referred to as:

Strategic Management

The purpose of this item is to maintain the detailed information regarding routine transactions, with an account established for each entity

Subsidiary Ledger

The main difference between substantive testing and controls testing is:

Substantive testing verifies whether information is correct, whereas control tests determine whether the information is managed under a system that promotes correctness.

Suppose that during the planning phase of an audit, the auditor determines that weaknesses exist in the client's computerized systems. These weaknesses make the client company susceptible to the risk of an unauthorized break-in. Which type of audit procedures should be emphasized in the remaining phases of this audit?

Substantive tests

The auditor's test of the accuracy of monetary amounts of transactions and account balances is known as:

Substantive tests

All of the following are types of integration strategies utilized by an ERP system except:

Supply Chain Integration

The organization and control of all materials, funds, and related information in the logistics process, from the acquisition of raw materials to the delivery of finished products to the end user is referred to as:

Supply Chain Management

The entities, processes, and information flows that involve the movement of materials, funds, and related information through the full logistics process, from the acquisition of raw materials to the delivery of the finished products to the end use is a set of linked activities referred to as:

Supply chain

In order to protect data files, production programs, and accounting records from unauthorized access, each of the following may be used, except:

Surveillance cameras

In order to help safeguard the availability in an electronic business environment, a company should implement controls such as business continuity planning, backup data and systems, in order to reduce the risk of:

System failures

Accountants and auditors are less likely to use which of the following system documentation methods?

System flowcharting

Systems professionals in the design and maintenance of IT systems use this documentation method

System flowcharting

This method of system documentation is intended to show the entire system, including inputs manual and computerized processes, and outputs

System flowcharting

A process map shows a circle with a letter or number in the middle. This symbol is used to show:

That there is a break in the process

Which of the following statements related to the COSO report is false?

The COSO report has not been updated since it was issued in 1992

When there is a difference between the inventory records quantity and the physical count of inventory:

The difference is resolved through inventory reconciliation.

The term "operations" is commonly used to refer to:

The main function of the business.

Which of the following ERP approaches accomplishes the ERP implementation beginning with one department?

The modular implementation approach

Which of the following is NOT one of the reasons for increased spending on ERP systems in recent years?

The need for earnings management

The conversion process is initiated when the company recognizes:

The need to conduct operations.

Most companies can justify the use of specialized asset management software programs instead of the spreadsheets or traditional manual systems for all of the following reasons, except:

The number of different methods of accounting for depreciation

Which of the following is not true of unethical behavior?

The only category of unethical behavior for accountants is inflating revenue

In inventory systems, when the actual quantity and the accounting records quantity are compared it is referred to as:

The physical inventory reconciliation.

Overhead includes all of the following except:

The president's salary.

Auditors should develop a written audit program so that:

The procedures will achieve specific audit objectives related to specific management assertions.

Within the purchases processes, which of the following is the first document prepared and thereby the one that triggers the remaining purchasing processes?

The purchase requisition

Within cash disbursements, all of the following should be true before a check is prepared, except that:

The purchased goods have been used.

Which of the following events would not constitute the start of the purchasing process?

The purchasing manager receives a shipment of raw materials that she had ordered.

Which of the following is not a main characteristic of client-server system?

The client does not participate in the processing or data manipulation

Characteristics of a client-server system include all of the following except:

The client normally stores the large database

A company must have systems in place to take care of all activities related to both routine and non-routine processes. The activities would include all of the following, except:

Review

Which of the following internal controls wold help prevent overpayment to a vendor or duplicate payment to a vendor?

Review and cancellation of supporting documents after issuing payment.

Which of the following was NOT listed as a procedure to accomplish independent checks?

Review of auditing procedures

Which of the following reviews would be most likely to indicate that a company's property, plant, and equipment accounts are not understated?

Review of the company's repairs and maintenance expense accounts.

AICPA Trust Principles describe five categories of IT risks and controls. Which of these five categories would be described by the statement, "The system is protected against unauthorized access"?

Security

The main risk related to this category of Trust Services Principles is unauthorized access

Security

Controls meant to prevent the destruction of information as the result of unauthorized access to the IT system are referred to as:

Security controls

The AICPA's Trust Services Principles practice that states that the organization has the necessary protections to try to insure that customer data is not lost, destroyed, altered, or subject to unauthorized access is under the title of:

Security for privacy.

A new technology that is used to authenticate users is one that plugs into the USB port and eliminates the need for a card reader. This item is called a:

Security token

One of the most critical controls to prevent theft of inventory purchased is to:

Segregate inventory custody from inventory record keeping.

If an accounting supervisor were allowed to hire employees, approve the hours worked, prepare the paychecks, and deliver the paychecks, which of the categories of control activities would be violated?

Segregation of duties

An extra digit added to a coded identification number, determined by a mathematical algorithm is called a:

Self-Checking Digit Check

Data collected would be all but the:

Selling company's name.

Ethical issues associated with data collection and storage include all of the following EXCEPT:

Selling non-sensitive information only to trusted agents.

Disposing of a fixed asset could include all of the following methods, except:

Sending it to another department.

Which of the following is not a major purpose served by the continual and proper use of the IT governance committee and the SDLC?

The conversion of the system

This type of input check ensures that the batch of transactions is sorted in order, but does not help to find the missing transactions

Sequence Check

Batch Processing correlates mostly to which of the following data storage techniques?

Sequential Access

The organization of files in a computer system normally uses one of two different access methods. The access method where the files store records in sequence, with one record stored immediately after another, is referred to as:

Sequential Access

Magnetic tape storage medium allows:

Sequential access storage with sequential data processing.

Storage media and methods of processing are:

Sequential and random access storage with batch and real time data processing.

Select the true statement from the following:

Servers may contain shared files and resources.

A company that wishes to buy cloud computing services enters into an agreement with a cloud computing provider. This agreement is called a:

Service Level Agreement (SLA)

This security feature, used on wireless networks, is a password that is passed between the sending and receiving nodes of a wireless network

Service set identifier

A field is a (n):

Set of characters.

Manufacturing companies implement ERP systems for the primary purpose of

Sharing information

The purpose of tracing shipping documents to prenumbered sales invoices would be to provide evidence that:

Shipments to customers were properly invoiced.

A chronological listing of shipments that allows management to track the status of sales and to answer customer inquiries regarding order status is called a(n):

Shipping Log

The use of electronic data interchange (EDI) to conduct sales electronically has both risks and benefits. Which of the following is a benefit of EDI, rather than a risk?

Shorter inventory cycle time

Which of the following is NOT a piece of relevant information that should be entered into the fixed asset subsidiary ledger upon the acquisition of a fixed asset?

The seller of the fixed asset

All of the following are classifications of inventory EXCEPT:

Sold goods

The use of employee prepared time cards and the entering of the time worked by the payroll department is a good example of which type of input method for AIS?

Source Documents and Keying

This method of input for AIS is considered to be time consuming and error prone due to the human effort required to write in some document and to manually key in the data:

Source Documents and Keying

The paper form used to capture and record the original data of an accounting transaction is called a(n):

Source document

The record that captures the key data of a transaction is called:

Source document

Which of the following correctly states the order of steps in a manual accounting system?

Source documents, Journals, Ledgers, Reports

The processes that authorize the raising of capital, execute the raising of capital, and properly account for that capital are called:

Source of capital processes

The internal control activities within the purchasing process, related to authorization of transactions, would include which of the following?

Specific individuals should be given authoritative responsibility for preparing purchase requisitions and purchase orders which would include which items to purchase, how many items, and which vendor.

Which of the following is NOT a responsibility given to the individuals making purchases for the company?

Specifying the order and sequence of payments to vendors.

Which of the following is generally an external computer fraud, rather than an internal computer fraud?

Spoofing

A Data Flow Diagram is used by systems professionals to show the logical design of a system. The advantage of the method is that it uses only four symbols. The symbol used to represent both sources and destinations of data is a(n):

Square with squared corners

Data is

The set of facts collected from transactions.

The disadvantages to real-time processing include:

The single database that is shared is more susceptible to unauthorized access

Real-time data item processing is more complex because:

There is duplication of effort in processing transactions.

The expanded SDLC presented in the textbook expands the processes within the system design phase. This is necessary because:

There is usually more than one software or system type that will meet the needs of the organization.

The fixed assets owned by a company are considered to be long-term because:

They are purchased with the intent of benefitting the company for a long period of time.

Which of the following is not one of the disadvantages of maintaining the legacy systems?

They are well supported and understood by existing personnel

Which of the following is not a disadvantage of maintaining legacy systems?

They contain invaluable historical data that may be difficult to integrate into newer systems

The internal control activity related to the adequate records and documents, related to sales, includes which of the following?

Those responsible for recording sales should ensure that the supporting documentation is retained and organized.

The matching of a purchase order to the related receiving report and invoice is known as:

Three-way match

SAP and PeopleSoft are part of which market segment of accounting software?

Tier 1 ERP Segment

The type of ERP system used by large, multinational corporations is known as

Tier one software

It is necessary for employees to maintain adequate records of the hours worked and the projects worked on. The record of hours worked by an employee for a specific payroll period is reported on a document called:

Time sheet

Which of the following correctly lists activities of the Payroll Process in chronological order?

Time sheet submitted by employee; time sheet approved; paycheck signed by management; update General Ledger

Internal control activities within the payroll process, identified as independent checks and reconciliations, would include which of the following?

Time sheets reconciled with the payroll register.

Source documents are usually preprinted and sequentially prenumbered. Which of the following is not one of the reasons for this prenumbering and preprinting?

To be sure that all of the documents have been recorded

The reasons to store customer names, addresses, and other similar information include all but:

To create financial reports.

There are a number of reasons that all access to an IT system be logged. Which of the following is not one of the reasons for the log to be maintained?

To establish a user profile

Select the correct statement from the following.

To review the purchases from a vendor inspect the purchases journal, to determine inventory levels of a specific item inspect the subsidiary ledger for inventory.

Which of the following statements is true regarding internal controls of capital and investment processes?

Top management fraud, rather than employee fraud, is more likely to occur.

The transactions and resulting processes related to loans, bonds payable, and stock should be executed only when

Top management or the board of directors authorize them.

In meeting the control objective of safeguarding of assets, which department should be responsible for distribution of paychecks ad custody of unclaimed paychecks, respectively? Distribution of Custody of Paychecks Unclaimed Paychecks

Treasurer Treasurer

Immediately upon receiving checks from customers in the mail, a responsible employee working in an environment of adequate internal control should prepare a listing of receipts and forward it to the company's cashier. A copy of this cash receipts listing should also be sent to the company's:

Treasurer for comparison with the monthly bank statement.

The officer within a corporation that usually has oversight responsibility for investment processes is the

Treasurer.

Which of the following, within the corporation, has the responsibility for making investment decisions?

Treasurer.

Accounting software was often not available in the early days of computers which required that the organization would develop, program, and implement their in-house accounting software.

True

Adapting to fair value measures in the preparation of IFRS-based financial statements will likely cause auditors to evaluate supporting evidence differently than if US GAAP was used.

True

Administrative processes are transactions and activities that either are specifically authorized by top managers or are used by managers to perform administrative functions.

True

Although there is no direct benefit, in terms of cash received, when a fraudster engages in earnings management, it is still unethical because it results in the falsification of the company's financial statements.

True

An alternative to batch processing is the use of electronic timekeeping devices, such as time clocks or badge readers.

True

An auditor cannot make informed decisions necessary to complete the audit without an understanding of the accounting information system

True

An enterprise resource planning (ERP) system allows a sales representative to provide the date that inventory for sale will be received from a vendor to a customer upon order placement.

True

An enterprise resource planning (ERP) system integrates all business processes and functions into a single software system using a single database.

True

An entire record forms a "database."

True

An example of good internal control is having one person responsible for the value of the total of the sales in the sales journal and another person responsible for the balance of sales in the general ledger.

True

An organization must maintain procedures to protect the output from unauthorized access in the form of written guidelines and procedures for output distribution

True

Any professionally trained accountant is able to perform an operational audit.

True

Application controls are intended to ensure that inputs and processing are accurate and complete and that outputs are properly distributed, controlled, and disposed

True

As the result of promotions or job changes, an employee may have different access or authorizations. Because of this, it is important that a company review user profiles and make changes to access and authority levels.

True

Auditors do not need to be experts on the intricacies of computer systems but they do need to understand the impact of IT on their clients' accounting systems and internal controls

True

Based on each employee's user profile, audit trails can be constructed and reported which employees initiated or conducted individual processes.

True

Batch processing is best suited to applications that have large volumes of similar transactions that can be processed as regular intervals

True

Batch processing is best suited to sequential access files

True

Batch processing occurs when similar transactions are grouped together, and that group is processed as a batch.

True

Because the evaluated receipts settlement process relies heavily on an IT system that can quickly access online purchase-order files, a system slowdown could halt all receiving activity.

True

Because the point-of-sale systems are not normally connected to outside trading partners, they pose fewer risks related to security and confidentiality than e-commerce or EDI systems.

True

Because the users of reports need the reports on an ongoing basis as part of their jobs, it is critical to have user feedback in the design of the details of the output reports.

True

Because there is no such thing as a standard cloud, it is not possible to standardize a risk assessment process and audit procedures for a cloud computing environment.

True

Business process reengineering (BPR) is the purposeful and organized changing of business processes to make them more efficient.

True

Business process reengineering means tailoring both the business process to IT and the IT process to the business process for best functionality and processing.

True

Business process reengineering should leverage the capabilities of information technology to improve the efficiency of business processes

True

CRM is a term for software solutions that help businesses manage customer relationships in an organized way.

True

Cash should be periodically verified by comparing the cash balance with the bank statement.

True

Cloud computing results in greater availability, but also requires greater security and processing integrity.

True

Collusion between employees is one of the easiest frauds to detect and prevent.

True

Collusion can make it much easier to commit and conceal a fraud or theft, even when proper internal controls are in place

True

Complete, up-to-date, and accurate documentation on production orders is needed to support the conversion process.

True

Computer logs should be maintained in order to have a complete record of who used the system and the histories of that use. This computer log would allow monitoring and identification of unauthorized accesses or uses.

True

Computer systems increase the efficiency and effectiveness of an organization but also increase their vulnerability

True

Computer-aided manufacturing (CAM) involves the complete automation of the production process, including the full replacement of human resources with computers.

True

Computer-assisted audit techniques are useful audit tools because they make it possible for auditors to use computers to audit large amounts of evidence in less time.

True

Concurrency means that all of the multiple instances of the same data are exactly alike.

True

Conflicting abilities are also referred to as incompatible duties.

True

Controlling access to the operating system is critical because that access opens access to any data or program within the system

True

Controls over cash collections are likely the most important control procedure because cash is the asset most susceptible to theft and misappropriation.

True

Controls will help to reduce risks, but it is impossible to completely eliminate risks

True

Corporate governance policies and procedures must be in place to assure that funds are expended only to the benefit the organization and its owners.

True

Customer fraud is a common problem for companies that sell merchandise online

True

Customizing an ERP system should be limited due to cost and upgrading to the system in the future.

True

Data in the data warehouse are called nonvolatile because they do not change rapidly in the same way that operational data change

True

Data must be collected to complete a transaction such as a sale.

True

Detailed customer accounts should be maintained and reconciled with customer statements regularly.

True

Diligent adherence to the SDLC process, by management, is part of fulfilling its ethical obligations of stewardship and fraud prevention.

True

Discussing the strength of encryption refers to how difficult it would be to break the code

True

Due to management's responsibility to monitor operations by examining reports that summarize the results of operations, it is necessary that the system provide timely and accurate information

True

ERP II has additional modules including customer relationship management and supply chain management for enhanced e-commerce transactions.

True

ERP implementation regarding IT infrastructure benefits include building business flexibility for current and future changes

True

ERP systems are based on a relational database system

True

ERP systems are built to interact with the IT systems of trading partners such as customers and suppliers.

True

ERP systems can grow with the business.

True

ERP systems such as SAP normally post their financial transactions in real-time for current information through all of the appropriate modules.

True

Each organization has to decide which combination of IT controls is most suitable for its IT system, making sure that the benefits of each control outweigh its costs

True

Early MRP applications utilized sales forecasts to compute material requirements for production.

True

Earnings management is the act of misstating financial information in order to improve financial statement results.

True

Employees who hack into computer networks are often more dangerous because of their knowledge of company operations

True

Even if a firm is a service or sales firm it may conduct some sort of manufacturing operation.

True

Even though a company has an obligation to pay for goods as soon as the goods are received, it is common to not record the actual liability until the invoice is received.

True

For a number of different reasons, a company may find it necessary to reject goods received which will start the purchase returns process.

True

For both source of capital processes and investment processes, the important control is the specific authorization and oversight by top management.

True

General controls apply to the IT accounting system and are not restricted to any particular accounting application

True

HIPs, or high-impact processes, are the critically important processes that must be executed correctly if the organization is to survive and thrive.

True

HTML has evolved over the years to increase functionality and security.

True

IT and business process reengineering have mutually enhancing relationships. The business processes should be supported by the IT capabilities.

True

IT systems are to be chosen and implemented to support the attainment of strategies and objectives

True

If a new cost is incurred related to an asset that is considered to enhance that, either by extending the useful life or increasing the efficiency, the fixed asset accountant must make sure the appropriate adjustments are made to the fixed asset subsidiary ledger.

True

If a sales order comes from a new customer, it is necessary to evaluate the creditworthiness of that customer before the sale is approved.

True

If an organization has the policy of allowing employees to work from home via telecommunications, they could be opening themselves up to an opportunity for a hacker to break-in to their network

True

If real-time processing is to occur, database records must be stored on random access media.

True

In a properly segregated IT system, no single person or department should develop computer programs and also have access to data that is commensurate with operations personnel

True

In centralized data processing the processing and the databases are stored and maintained in a central location.

True

In distributed data processing (DDP) and distributed databases (DDB), the processing and the databases are dispersed to different locations of the organization.

True

In most cases, a fraud will include altering accounting records to conceal the fact that a theft has occurred

True

In order to enhance controls, reconciliations should be performed by company personnel who are independent from the tasks of initiating or recording the transactions with the accounts being reconciled.

True

In order to gain a complete understanding of the system under study, the project team should seek the opinions and thoughts of those who use the system in addition to observation and documentation review.

True

In order to meets it obligation of corporate governance, the board of directors must oversee IT.

True

In order to properly carry out an audit, accountants collect and evaluate proof of procedures, transactions, and / or account balances, and compare the information with established criteria.

True

In the case of a manual accounting system, an approved journal voucher must be forwarded to the general ledger department before transactions can be recorded.

True

In the case of high-dollar assets, there should be a strict approval process that requires the authorization of top management or the initiation of the capital budgeting procedures.

True

In the detailed design phase, all of the individual steps within a process must be identified and designed.

True

Independent reconciliation of the periodic inventory counts and the inventory ledger and the general ledger will help to assure that inventory is being properly accounted for.

True

Industrial espionage can occur with or without the use of a computer

True

Information is the interpretation of data that have been processed.

True

Information risk is the chance that information used by decision makers may be inaccurate.

True

Internal controls over sales returns are similar to those for the revenue process where it is important to match receiving reports for returns with the related credit memos to ensure that the company issues credit for all returns for the correct amounts.

True

Inventory warehousing involves managing the holding area for finished goods awaiting sale.

True

It is common that personnel related expenses are one of the largest expenses reported on the company's income statement.

True

It is essential that accountants oversee the data conversion from the old system to the new system to make sure that all accounting data is completely and correctly converted.

True

It is important for accountants to consider possible threats to the IT system and to know how to implement controls to try to prevent those threats from becoming reality

True

It is important for accountants to have some understanding of basic computer terminology

True

It is important to understand that the IT governance committee delegates many of its duties by the policies that it develops

True

It is likely that the IT governance committee will go back through the phases of the SDLC to design new and improved IT systems.

True

It is necessary for a company to consider the risks of its system to determine whether the costs of implementing a control procedure are worthwhile in terms of the benefits realized from the control.

True

It is necessary that managers remember that they are stewards of funds expended by a business - that the funds are not owned by the managers.

True

It is necessary to identify the "entry points" in the IT system that make an organization susceptible to IT risks

True

It is not always possible to avoid all mistakes and frauds because there will always be human error, human nature, and it is not always cost-effective to close all the holes

True

It is not necessary to get specific authorization for each individual routine transactions.

True

It is not possible to have an internal control system that will provide absolute assurance

True

Just-in-time (JIT) production systems are concerned with minimizing or eliminating inventory levels of all inventory items.

True

Location-wise implementation and pilot implementation are both considered methods of implementation.

True

MRP II systems let vendors track customer inventory levels and trigger inventory shipments when prearranged levels are met.

True

Magnetic tape is a storage medium that allows only a sequential access type of storage.

True

Maintenance and control is concerned with maintaining the capital resources used to support production, including production facilities and other fixed assets.

True

Management assertions relate to the actual existence and proper valuation of transactions and account balances.

True

Management fraud is the intentional misstatement of financial information and may be difficult for auditors to find because the perpetrator will attempt to hide the fraud.

True

Management has an ethical obligation to create and enforce policies and practices which ensure that private customer data are not misused.

True

Management must examine feedback from the ERP system to assist in the proper management and control of operations and financial conditions.

True

Many IT systems do not use source documents; the input is automatic

True

Many companies use a tracking system for their fixed assets that would include applying a fixed asset tag, number, or label to the asset.

True

Most companies conduct business transactions with checks so that a written record is established for cash disbursements.

True

One advantage in the B2B e-business environment is that operations costs can be reduced through inventory reductions and efficiencies can be increased by location of nearby assets when needed.

True

One advantage to the use of questionnaires is that they an be answered anonymously, which allows the respondent to be more truthful without fear of negative consequences.

True

One characteristic that the Internet, intranets, and extranets have in common is that they are all networks that are intended for the sharing of information and the conducting of transactions.

True

One of the advantages of private cloud computing is expanded access

True

One of the greatest risks of ERP cloud systems is the potential service outage that might cause the system to be unavailable.

True

One of the reasons that management, not employees, initiates more unethical and fraudulent activities is that employees do not have access to much of the documentation needed to affect the event.

True

One of the sources of risk exposure related to telecommuting workers is that the company's network equipment and cabling becomes an entry point for hackers and unauthorized users

True

Online processing is best suited to situations where there is a large volume of records by only a few records are needed to process any individual transaction

True

Overtime hours are paid at a rate different from the regular hours, usually one and one-half times the standard rate.

True

Packet switching is the method used to send data over a computer network.

True

Payroll disbursements are to be authorized by the accounts payable department on the basis of the company's need to satisfy its obligation to its employees.

True

Payroll information includes personal information about employees, such as their pay rate and performance, and must be kept confidential.

True

Payroll outsourcing has become popular (and prevalent) become is offers increased convenience and confidentiality.

True

Physical controls should be in place in the company's storerooms, warehouses, and production facilities in order to safeguard the inventories held therein.

True

Preparing payroll manually is extremely time consuming due to the process of extracting all these inputs from the records and performing the mathematical computations.

True

Proper sales authorization control requires obtaining approval before processing an order and again before the order is shipped.

True

Real-time processing occurs when transactions are processed as soon as they are entered.

True

Record files related to sales can be organized by customer name or by the numerical sequence of the documents.

True

Redundancy is needed for servers, data, and networks.

True

Regardless of how effective and good the accounting system is, if top management is intent on falsifying financial statements by inflating revenue, they can usually find ways to misstate revenue.

True

Regardless of the results of the control testing, some level of substantive testing must take place.

True

Regional ISPs connect to the backbone through lines that have less speed and capacity than the backbone.

True

Risk assessment in cloud computing is particularly challenging because the threats to a company's data are uncontrolled, and often unforeseen, by the company.

True

Risk can be inherent in the company's business, due to things such as the nature of operations, or may be caused by weak internal controls.

True

Sales processes need supporting practices such as credit checks and stock authorization.

True

Scalability is one of the advantages of cloud-based databases. What this means is that as the company grows, they can easily purchase new capacity from the cloud provider.

True

Scalability, related to public cloud computing, refers to the fact that as a company can easily purchase new capacity from the cloud provider

True

Sequential access means that data are stored in sequential or chronological order.

True

Service firm internal reports are more likely to focus on sales and the status of projects.

True

In order to help safeguard the security and confidentiality in an electronic business environment, a company should implement controls such as user ID, password, log-in procedures, access levels, and authority tables in order to reduce the risk of:

Unauthorized access

The security and confidentiality risks of computer based matching would include:

Unauthorized access to the system's ordering and matching functions would allow the insertion of fictitious vendors and / or invoices.

There are a number of ways that frauds may be carried out to try to receive excess compensation. Which of the following is not one of those methods?

Understatement of job related expenses

Since the sale of goods in an ERP system may automatically trigger more production, which in turn would trigger the purchase of raw materials there is a significant need to ensure that these integrated processes are triggered at the correct time and in the correct amounts.

True

Software should never be implemented before it is tested.

True

Standard costs are expected costs based on projections of a product's required resources.

True

Standard costs include direct materials, direct labor, and overhead. \

True

Subsidiary ledgers maintain the detail information regarding routine transactions, with an account established for each entity.

True

Supply Chain Management integrates supply and demand management within and across companies.

True

Systems operators and users should not have access to the IT documentation containing details about the internal logic of computer systems.

True

The AICPA Trust Services Principles state that the customer should be given the choice regarding the collection and retention of data.

True

The ERP system can incorporate a matrix of tasks that are compatible.

True

The IT governance committee should constantly assess the long-term strategy of the company and determine the type of IT systems to purchase, develop and use.

True

The Sarbanes-Oxley Act has placed restrictions on auditors by prohibiting certain types of services historically performed by auditors for their clients.

True

The VPN, virtual private network, uses the internet and is therefore not truly private - but is virtually private

True

The accounting information system is often the tool used to commit or cover up unethical behavior

True

The accounts payable department keeps copies of purchase orders and receiving reports, that will be compared to the related invoice, to be sure that the invoices represent goods that were ordered and received.

True

The acquisition of fixed assets is normally initiated by a user department when they identify a need for a new asset, either to replace an existing asset or to enhance its current pool.

True

The acronym COBIT stands for Control Objectives for Information Technology, an extensive framework of information technology controls developed by Information Systems Audit and Control Association

True

The analysis phase is the critical-thinking stage of systems analysis.

True

The assigning of access and authority for a specific user ID is referred to as a user profile.

True

The authorization of a cash disbursement occurs when the accounts payable department matches the purchase order, receiving report, and the invoice, and then forwards the matched documents to the cash disbursements department.

True

The closer the source document matches the input screen, the easier it will be for the data entry employee to complete the input screen without errors

True

The common term for business-to-consumer e-commerce is B2C. The common term for business-to-business electronic sales is B2B.

True

The controls discussed in the chapter, related to safeguarding assets within the expenditures process and ensuring the accuracy and completeness of expenditure processes, help to enhance corporate governance structure.

True

A battery to maintain power in the event of a power outage meant to keep the computer running for several minutes after the power outage is an example of a(n):

Uninterruptible power supply

The letter UPC, when relating to bar codes, stands for:

Universal Product Code

Five different components of the accounting system were presented in the textbook. Which of the following is not one of those components?

Work steps assure that all business processes are recorded using computer-based procedures

A small piece of program code that attaches to the computer's unused memory space and replicates itself until the system becomes overloaded and shuts down is called: A. Infections

Worm

Subsidiary ledgers:

Would contain the detailed information of a customer's account.

IT governance includes all but which of the following responsibilities?

Writing programming code for IT systems

An extensible markup language designed specifically for financial reporting is:

XBRL

Select the correct statement from the following.

XML is extensible markup language while XBRL is extensible business reporting language.

An example of Cash receipts fraud would include:

an employee steals checks collected from customers

The term "ghost employee" means that:

someone who does not work for the company receives a paycheck.

Which of the following URL's would indicate that the site is using browser software that encrypts data transferred to the website?

https://misu

Auditors should perform this type of test to determine the valid use of the company's computer system, according to the authority tables.

Authenticity tests

The supply chain:

Includes manufacturing facilities

Which of the following statements does not refer to a legacy systems?

Includes source documents, journals, and ledgers

OLAP tools include all of the following EXCEPT:

Inclusion reports.

Availability risks of e-commerce, or e-business, include all of the following, except:

Incomplete audit trail

The internal control process of requiring physical controls in place in areas where fixed assets are held, will help to minimize the risk of:

Incorrect amounts

The internal control process that requires purchase return records be matched with the original purchase documentation and verified for item descriptions, quantities, dates, and prices, will help to minimize the risk of:

Incorrect amounts

The separation of the responsibility for custody of cash from the responsibility for reconciling the bank accounts will help to minimize the related risk of:

Incorrect amounts

Types of fraud that may occur in the payroll function includes all of the following, except:

Incorrectly computed tax withholdings

If an organization's IT systems are not properly controlled, they may become exposed to the risks of:

All of the above

Immediate preparation of receiving reports for all actual receipts of goods helps to minimize the risk of:

All of the above

By maintaining a well-defined, complete chart of accounts, an organization minimizes the related risk of:

Amounts posted to wrong accounts

Select the true statement from those provided below.

An ERP system is designed to be a stand-alone software application to accomplish revenue, expenditures, conversion, and administrative processes.

Operation risks with an ERP system includes all of the following EXCEPT:

An unauthorized user can affect more processes in the legacy system.

This table contains a list of valid, authorized users and the access level granted to each one

Authority table

The software that accomplishes end user tasks such as work processing, spreadsheets, and accounting functions is called:

Application Software

This type of processing control test involves a comparison of different items that are expected to have the same values, such as comparing two batches or comparing actual data against a predetermined control total.

Balancing Tests

A printed code consisting of a series of vertical, machine readable, rectangular bars and spaces, that vary in width and are arranged in a specific ways to represent letters and numbers are referred to as:

Bar Coding

All of the risks and audit procedures that apply to a PC environment may also exist in networks, but the risk of loss of much lower.

False

XML:

Facilitates the exchange of data between organizations via web pages.

A backbone provider is an organization such as the National Science Foundation (NSF) which funded the Internet and/or the WWW.

False

A bill of materials lists both physical items and skill requirements needed to construct an item of inventory.

False

Advantages of an automated system includes all of the following, except:

Increased cost of the system.

Although it is uncommon, some companies maintain separate checking accounts that are used for payroll transactions.

False

An enterprise resource planning (ERP) system would update accounts receivable and inventory when purchased goods are received from a vendor.

False

An example of unstructured data would be customer telephone numbers.

False

An extranet is similar to an internet except that it offers access to a greater number of sites than a standard Internet or WWW connection.

False

An important requirement for CPA firms is that they must be personally involved with the management of the firm that is being audited.

False

An internal auditor is not allowed to assist in the performance of a financial statement audit.

False

Application controls apply to the IT accounting system and are not restricted to any particular accounting application

False

Approvals for each journal voucher are specific authorizations.

False

There are different ways to issue a purchase order to a vendor. Which of the following is not one of the ways?

Hard copy by hand

Cleansed or scrubbed data:

Has had errors and problems fixed.

Which of the following describes a mathematical sum of data that is meaningless to the financial statements but useful for controlling the data and detecting possible missing items?

Hash Total

The totals of fields that have no apparent logical reason to be added are called:

Hash Totals

Which control total is the total of field values that are added for control purposes, but not added for any other purpose?

Hash total

Which of the following would be a correct way to compute the gross pay for an employee?

Hours Worked times Authorized Pay Rate

The function of this committee is to govern the overall development and operation of IT systems

IT Governance Committee

When companies rely on external, independent computer service centers to handle all or part of their IT needs it is referred to as:

IT Outsourcing

The security of having cash receipts deposited in the bank on a daily basis will help to minimize the related risk of:

Lost or stolen cash

An example of a one-to-one relationship would be:

One customer, one billing address.

An ERP system uses:

One database which contains all data items associated with the organization.

An example of a one-to-many relationship would be:

One employee, three timecards for the pay period.

Proper IT controls will NOT:

Prevent an employee from sharing his password.

Firewalls:

Prevent external users from accessing the extranet or intranet.

This type of control is designed to avoid errors, fraud, or events not authorized by management

Prevention

Related audit tests to review the existence and communication of company policies regarding important aspects of IT administrative control include all of the following, except:

Prevention of unauthorized access

The advantages of e-commerce, or e-business, include all of the following, except:

Repudiation of sales transactions

All ERP vendors have developed cloud-based ERP products.

True

All types of auditors should have knowledge about technology-based systems so that they can properly audit IT systems.

True

Although accountants are heavily involved in the creation, implementation, and monitoring of the control structure, management has the ultimate responsibility to establish a control environment

True

Amounts withheld from an employee paycheck will ultimately be paid to another vendor.

True

An entire set of files is a database.

True

Which of the following is NOT an objective of IT usage to support business processes?

Increased data to use in the data analytics process

An IT system that uses touch screens, bar coded products, and credit card authorization during the sale is called a(n):

Point of sales system.

An IT system that uses touch-screen cash registers as an input method is called:

Point-of-sale system

A review of the feasibility assessments and other estimates made during the projects, the purpose of which is to help the organization learn from any mistakes that were made and help the company avoid those same errors in the future.

Post-Implementation Review

Which of the following steps within the systems implementation phase could not occur concurrently with other steps, but would occur at the end?

Post-implementation review

Which of the following statements regarding the authorization of general ledger posting is NOT true?

Posting to the general ledger always requires specific authorization.

(Magnetic) Disk storage is:

Preferred over magnetic tape storage.

The purpose of this step in the systems analysis phase is to determine whether the problem or deficiency in the current system really exists and to make a "go" or a "no-go" decision.

Preliminary Investigation

Independent auditors are generally actively involved in each of the following tasks except:

Preparation of a client's financial statements and accompanying notes.

Which of the following activities is an inventory control activity?

Routing

A file is a:

Row within a record.

Important characteristics of electronic data interchange (EDI) include all of the following, except:

Sales register is used to record all transactions.

External reports do not include:

Sales reports.

Select the answer that contains only internal reports.

Sales, inventory, aged receivables.

Because it is not possible to test all transactions and balances, auditors rely on this to choose and test a limited number of items and transactions and then make conclusions about the

Sampling

The purpose of this 2002 act was to improve financial reporting and reinforce the importance of corporate ethics

Sarbanes-Oxley Act

Which of the following is not one of the approaches used to achieve the management of an IT control framework?

Sarbanes-Oxley Act section on IT Controls

A company using public cloud computing has the ability to purchase new capacity from the cloud provider, instead of buyer servers or new data storage. This ability is referred to as:

Scalability

Risks associated with public cloud computing include all of the following, except:

Scalability

In this feasibility, the project team must estimate the total amount of time necessary to implement the each alternative design.

Schedule feasibility

Frontware, which adds modern, user friendly screen interfaces to legacy systems are referred to as:

Screen scrapers

The correct sequence of the supply chain is:

Secondary suppliers, suppliers, manufacturer, warehouses, distributors, retailers, and customers.

This communication protocol is built into web server and browser software that encrypts data transferred on that website. You can determine if a website uses this technology by looking at the URL

Secure sockets layer

Select the correct statement from the following:

The accounts payable journal will not show detail of purchases from a vendor.

A web server is:

A computer and hard drive space that stores web pages and data.

Protocols can be considered:

A language native to the network so all computers can translate it.

A protocol is required so that:

Answers A, B, and C are all correct.

Fraud is:

Precluded by proper internal control processes.

The average annual cost of cyber crime to U.S. companies is:

$3.8 million

1. The AICPA's Trust Services Principles state that online privacy focuses on: 1. Name 2. Address 3. Social Security number 4. Government ID numbers 5. Employment history 6. Personal health conditions 7. Personal financial information 8. History of purchases 9. Credit records

1, 2, 3, 4, 5, 6, 7, 8, and 9.

E-commerce sites may: 1. Provide access to manufacturer information on the product. 2. May provide tax free sales of retail goods. 3. Require shipping and handling fees to be paid. 4. Provide links to live or video presentations of product information. 5. Not provide as quick order processing as the company's retail locations.

1, 2, 3, and 4 are correct.

Processes in supply chain management: 1. Involve trading processes from a supplier to the business. 2. Involve trading processes from the business to a customer. 3. Involve trading between the business and other intermediaries. 4. Do not include any transactions once raw materials are put into production.

1, 2, and 3 are correct.

Supply chain management is: 1. The management and control of all materials. 2. The management and control of all funds related to purchasing. 3. The management of information related to the logistics process. 4. Limited to the flow of materials from vendors into the production cycle.

1, 2, and 3 are correct.

Customizing an ERP system: 1. Will tailor the ERP system to the user. 2. May have a prohibitive cost. 3. May hinder future system upgrades. 4. Is recommended wherever possible.

1, 2, and 3 only.

E-business 1. Includes the sale of raw materials between companies. 2. Includes using the Internet as an electronic network. 3. Sales will usually be smaller dollar amounts with many sales. 4. Is a broader concept than e-commerce.

1, 2, and 4 only.

While using a manual general ledger system, the audit trail could consist of: 1. General ledger. 2. Electronic images. 3. Journal vouchers. 4. Paper documents. 5. Source documents. 6. Special journals. 7. Subsidiary ledgers.

1, 3, 4, 5, 6, and 7.

Database relationships may be: 1. One-to-one relationships. 2. One-to-one relationships only. 3. One-to-many relationships. 4. One-to-many relationships only. 5. Many-to-one relationships. 6. Many-to-one relationships only. 7. Many-to-many relationships. 8. Many-to-many relationships only.

1, 3, 5, and 7 only.

Business process reengineering (BPR): 1. Aligns business processes with IT systems to record processes. 2. Reengineer the underlying processes to be more effective. 3. Improves the efficiency of the underlying process through automation. 4. Requires significant investment in IT resources. 5. Does not have a mutual enhancement effect with IT.

1, 3, and 4 only.

Data conversion will: 1. Require an appropriate amount of time be devoted to the conversion. 2. Be done at a minimal cost. 3. Import data from many legacy systems into a single RDBMS. 4. Require cleansing of errors and configuration inconsistencies.

1, 3, and 4 only.

When a transaction occurs in a business, the accountant must decide if it is a regular and recurring transaction. If the transaction IS regular and recurring, it will be recorded in a ____1_____. If it is NOT regular and recurring, it will be recorded in a _____2_____.

1=Special journal; 2=General Journal

The role of the auditors is to analyze the underlying facts to decide whether information provided by management is fairly presented. Auditors design ____1_____ to analyze information in order to determine whether ____2_____ is/are valid.

1=audit tests; 2=management's assertions

As required by Sarbanes-Oxley, enhanced ERP systems provide feedback to management regarding internal controls. To effectively use the function, there are important steps that need to be taken. 1. Establish and maintain a list of compatible duties. 2. Insure that employees are given access and authority only to those parts of the system required. 3. Periodically review the user profile and change any access and authority levels as necessary. 4. Configure the ERP system to track and report any instances where an employee initiated or records any event. 5. Monitoring the periodic reports or real-time reports by the appropriate manager to determine if user profiles have changed.

2, 3, 5

Select the true statements from the following. 1.Fraud, theft, or theft of data on the Internet and WWW are reduced by its regulated and controlled state. 2.A customer may feel isolated from the product because of the inability to touch or handle the product. 3.E-commerce customers may be targeted for solicitations based on their purchasing history. 4.E-commerce customers will often incur a shipping and handling charge with purchases. 5.E-commerce customers will always find the best product at the best price.

2, 3, and 4 are all true statements.

E-business: 1. Is a narrower concept than e-commerce. 2. Services the customers and the vendors. 3. Is electronic recording and control of internal processes. 4. Uses electronic means to enhance business processes.

2, 3, and 4 only.

Proper data analysis of data warehouse files: 1. Improves short-term planning. 2. Improves long-term planning. 3. Enhances the ability to meet customer needs. 4. Increase performance.

2, 3, and 4.

While using a computerized IT accounting system, the audit trail could consist of: 1. General ledger. 2. Electronic images. 3. Journal vouchers. 4. Paper documents. 5. Source documents. 6. Special journals. 7. Subsidiary ledgers.

2.

A firm expects to sell 1000 units of its best-selling product in the coming year. Ordering costs for this product are $100 per order, and carrying costs are $2 per unit. Compute the optimum order size, using the EOQ model.

317 units

A company has the following invoices in a batch: Invoice No. Product ID Quantity Unit Price 401 H42 150 $30.00 402 K56 200 $25.00 403 H42 250 $10.00 404 L27 300 $ 5.00 Which of the following numbers represents a valid record count? A. 1

4

The reasons for storing data to complete a customer sales transactions include all of the following EXCEPT: 1. Taking the order. 2. Pulling the items from the warehouse. 3. Shipping the items to the customer. 4. Billing the customer. 5. Providing feedback to the customer on the order. 6. Updating the customer account for payment.

5

A URL is converted to an IP by:

A DNS accessed when the browser sends the command.

Select the false statement from the following.

A character is a single letter, number, or symbol.

Select the true statement from the following.

A character is a single letter, number, or symbol.

The sales and cash collections process begins when:

A customer places an order with the company

When special journals are utilized:

A general journal is still utilized for infrequent and unique journal entries.

HTML is:

A language utilized to present website words, data, and pictures.

Advantages of e-commerce include all EXCEPT:

A narrower market for goods and services.

Which of the following audit objectives relates to the management assertion of existence?

A transaction actually occurred (i.e., it is real)

Nonrepudiation means that:

A user cannot deny any particular act that he or she did on the IT system

Which of the following is not an example of a software system that supports e-business and e- commerce?

AFB

Which of the following involves the inclusion of both variable and fixed costs in the determination of unit costs for ending inventories and cost of goods sold?

Absorption costing

Ethical issues of manufacturing include all except:

Absorption costing.

The AICPA's Trust Services Principles practice that states that customers should have access to the data provided so that the customer can view, change, delete, or block further use of the data provided is under the title of:

Access

The security of assets and documents related to cash disbursements would include all of the following, except:

Access to records should be limited to persons with the authority to sign checks.

Which of the following groups of processional within a organization have a history of designing and implementing the controls to lessen risks?

Accountants

There are many reasons for accountants to become aware of potential unethical behaviors. Which of the following is not one of the reasons identified by the authors?

Accountants are responsible for identifying unethical and illegal activities

The process that must identify the transactions to be recorded, capture all the important details of the transactions, properly process the transaction details, and provide reports is termed the:

Accounting Information System

The system that captures, records, processes, and reports accounting information is referred to as a(n):

Accounting information system

Segregation of duties is accomplished by which of the following?

Accounting personnel having restricted access to physical inventory.

Which department maintains copies of purchase orders and receiving reports so that the documents can be compared before the accounting records are updated?

Accounts Payable

Which of the given departments will immediately adjust the vendor account for each purchase transaction so that the company will know the correct amount owed to the vendor?

Accounts Payable

A kickback is an example of which type of fraud?

Accounts Payable Fraud

All of the following documents are necessary in the cash receipts process except:

Accounts Payable Subsidiary Ledger

Which department is generally responsible for the notification of the need to make cash disbursements and the maintenance of vendor accounts?

Accounts payable department

The accounting record that includes the details of amounts owed to each vendor is called the:

Accounts payable subsidiary ledger

In order to properly monitor customer payments and determine the amount of an allowance for uncollectible accounts, a(n) _________ should be generated to analyze all customer balances and the respective lengths of time that have elapsed since payments were due.

Accounts receivable aging report

Sales and sales returns can affect which journals?

Accounts receivable, cash, inventory, and sales.

Unauthorized access to the operating system would allow the unauthorized user to:

All of the above

Rework refers to:

Additional procedures to bring a product up to specifications.

Techniques used for gathering evidence include all of the following, except:

Adequate planning and supervision

Activities involved with the fixed assets disposal phase of the fixed assets processes include all of the following, except:

Adjusting periodic depreciation

Which of the following is a proper description of an auditor report?

Adverse opinion - notes that there are material misstatements presented.

All of the following are external reports except:

Aged Accounts Receivable Schedule

Cost-benefit can be defined as:

Alarm systems and vaults for fine jewelry inventories.

Which of the following statements is true?

All accounting systems, whether computerized or not, must capture data, process the data, and provide outputs

Ethical responsibilities are shared by:

All concerned including employees, customers, and management.

Sequential access means:

All data items must be read in the order in which they were placed into the system

All of the following are examples of security controls except for?

All of the Above are examples of security controls

After all of the RFPs have been received, either the IT governance committee or the project team will evaluate the proposals in order to select the best software package. Things that must be considered would include:

All of the above

All of the following are environmental control issues for physical hardware except for:

All of the above

Common means of presenting the revenue and cash collections processes pictorially include:

All of the above

Confidentiality of information is an ethical consideration for which of the following party or parties?

All of the above

Considerations related to adopting or increasing cloud computing usage, include:

All of the above

Financial Stewardship can be ensured in the revenue process by establishing and maintaining which of the following?

All of the above

In a large company, there are hundreds, possibly thousands, of sales transactions each day. The company needs to have in place, systems and processes to:

All of the above

The control environment related to the fixed asset processes can be enhanced through the implementation of various access controls, such as:

All of the above

The data preparation procedures are to be well-defined so that employees will be sure of:

All of the above

The definition of fraud includes the theft of:

All of the above

A good system of internal control includes many types of documentation. Which of the following types of documentation is not part of the adequate records and documents category of internal control?

All of the following are types of documentation

A use of enterprise application integration would include:

All of the listed items would be included

With structured query language (SQL):

All of the possibilities, A, B, and C, are correct.

Which of the following process within a supply chain can benefit from IT enablement?

All process throughout the supply chain

Network databases:

Allow shared branches within the inverted tree structure.

If a company does not prepare an aging of accounts receivable, which of the following accounts is most likely to be misstated?

Allowance for uncollectible accounts

The transmission of packets:

Allows great versatility in the transmission of data.

The standard format used with electronic data interchange (EDI) allows all vendors and buyers to speak the same language. This group has developed the standard format for the common documents used in the sales process:

American National Standards Institute

Which of the following statements regarding an audit program is true?

An audit program establishes responsibility for each audit test by requiring the signature or initials of the auditor who performed the test.

The payroll process is initiated when:

An employee is hired

Which of the following is most likely to be effective in deterring fraud by upper level managers?

An enforced code of ethics

A record is:

An entire set of fields for a specific entity.

When discussing the supply chain:

An entity may not be able to directly control all of the interrelated activities within the supply chain

A process or procedure in an IT system to ensure that the person accessing the IT system is valid and authorized is called:

Authentication of users and limiting unauthorized access

This type of software should be used to avoid destruction of data programs and to maintain operation of the IT system. It continually scans the system for viruses and worms and either deletes or quarantines them

Antivirus Software

Random access means:

Any data item can be directly accessed without reading in sequence.

Internal controls over the input, processing, and output of accounting applications are called:

Application Controls

Internal controls used specifically in accounting applications to control inputs, processing, and outputs are referred to as a(n):

Application Controls

The existence of verifiable information about the accuracy of accounting records is called a(n):

Audit trail

The process where the details of individual transactions at each stage of the business process can be recreated in order to establish whether proper accounting procedures for the transaction were performed is called:

Audit trail

Which of the following is not one of the identified causes of information risk?

Audited information

This organization is part of the AICPA and was the group responsible for issuing Statements on Auditing Standards which were historically widely used in practice.

Auditing Standards Board

Many companies design their IT system so that all documents and reports can be retrieved from the system in readable form. Auditors can then compare the documents used to input the data into the system with reports generated from the system, without gaining any extensive knowledge of the computer system and does not require the evaluation of computer controls. This process is referred to as:

Auditing around the system

Which of the following is the most effective way of auditing the internal controls of an IT system?

Auditing through the computer

This approach, referred to as the whitebox approach, requires auditors to evaluate IT controls and processing so that they can determine whether the information generated from the system is reliable.

Auditing through the system

The process of user identification to ensure that only authorized users are accessing the IT system, which occurs through the use of user ID, password, and other unique identifiers, is called:

Authentication

When there is no necessity for a preexisting relationship between buyer and seller, that transaction is more likely to be classified as

B2C

Select the correct statement from the following.

B2C is considered e-commerce while B2B is considered e-business.

Select the correct statement from the following:

B2C is typically few line items per order while B2B is typically many line items per order.

The type of organization that serves as the main trunk line of the Internet is called a

Backbone provider.

Which of the following is not a method of updating legacy systems?

Backoffice ware

Which of the following is not one of the stated physical controls for inventory in a warehouse?

Backup Copies

An electronic payroll time keeping device that collects data when employee identification badges are swiped through an electronic reader are called:

Badge reader

Internal reports do not include:

Balance Sheets

Select the answer that contains only external reports.

Balance sheet, income statement, cash flow statement.

Audit trails:

Can be from the source document to the journal entry or from the journal entry to the source document.

When computerized technology is introduced into processes, the processes

Can be radically redesigned to take advantage of the speed and efficiency of computers to improve processing efficiency.

The accounting profession has accepted this report as the standard definition and description of internal control.

COSO Report

A process, effected by an entity's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives related to the effectiveness and efficiency of operations, reliability of financial reporting, and compliance with applicable laws and regulations is:

COSO's definition of internal control

Financial statement audits are required to be performed by:

CPAs

Data processing and storage:

Can be distributed to meet organizational requirements.

The proper order of activity in an accounting information system would be as follows:

Capture, Record, Process, Report

The substance of an accounting information system includes:

Capturing, recording, processing and reporting accounting information

While an employee may have access to privileged information, an example of unethical activities would be a

Car salesman viewing the credit rating of a customer with a car in for warranty repairs.

The term that refers to how many instances of an entity relates to each instance of another entity is:

Cardinality

Which of the following departments is not a part of the purchasing process?

Cash Disbursements

A chronological listing of all payments is referred to as a(n):

Cash Disbursements Journal

A special journal used to record all cash collections is called a(n):

Cash Receipts Journal

Independent checks and reconciliations, related to cash receipts, include all of the following, except:

Cash collections should be deposited in the bank in a timely manner to prevent the risk of theft.

Special journals include:

Cash disbursements journal, cash receipts journal, payroll journal, purchases journal, and sales journal.

A manager suspects that certain employees are ordering merchandise for themselves over the Internet without recording the purchase or receipt of the merchandise. When vendors' invoices arrive, one of the employees approves the invoices for payment. After the invoices are paid, the employee destroys the invoices and related vouchers. To trace whether this is actually happening, it would be best to begin tracing from the:

Cash disbursements.

The goal of a physical inventory reconciliation is to

Compare the physical count with the perpetual records.

Which of the following terms in not associated with a financial statement auditor's requirement to maintain independence?

Competence

This type of input validation check assesses the critical fields in an input screen to make sure that a value is in those fields

Completeness Check

Which programmed input validation makes sure that a value was entered in all of the critical fields?

Completeness check

Two or more computers linked together to share information and/or resources is referred to as a(n):

Computer Network

This software allows engineers to work with advanced graphics at electronic work stations to create 3-D models that depict the production environment.

Computer aided design (CAD)

The advantages of using IT-based accounting systems, where the details of transactions are entered directly into the computer include:

Computer controls can compensate for the lack of manual controls

Which of the following would normally not be found on the IT Governance Committee?

Computer input operators

This complete records of all dates, times, and uses for each person is referred to as a(n):

Computer log

Select the true statement.

Computer-aided design may be three dimensional.

_____________ integrates all of the conversion processes to allow for minimal disruptions due to reporting requirements or inventory movement issues.

Computer-integrated manufacturing systems (CIMs)

Which of the following statements is true related to manual systems?

Computerized systems often rely on some manual record keeping

Which of the following is not a risk inherent in an IT system?

Computers being stolen

Changing the accounting records to hide the existence of a fraud is termed:

Concealment

The process of matching alternatives system models to the needs identified in the system analysis phase is called:

Conceptual Design

_______ is the aggregation or collection of similar data. It is the opposite of drill down in that it takes detailed data and summarizes it into larger groups.

Consolidation

When management designs and implements effective administrative processes:

Constant monitoring is necessary.

Tables in a flat file database must:

Contain similar data in the column.

A production schedule:

Contains information from the operations list.

The data warehouse:

Contains the historical information needed for planning and analysis.

A process of constant evidence gathering and analysis to provide assurance on the information as soon as it occurs, or shortly thereafter, is referred to as:

Continuous auditing

A document completed to prepare a record of the sales return and to adjust the amount of the customer's credit status is called a(n):

Credit memorandum

The source document that initiates the recording of the return and the adjustment to the customer's credit status is the:

Credit memorandum

High-impact processes (HIPs) are:

Critical to the long-term objectives of the organization.

This document is prepared on a regular basis to accumulated and summarize all the transactions that have taken place between the customer and the company within the period.

Customer Account Statements

When a customer improperly obtains cash or property from a company, or avoids liability through deception, it is termed:

Customer fraud

The term for software solutions that help businesses manage customer relationships in an organized way is:

Customer relationship management

Supply chain management (SCM) is a critical business activity that connects a company more closely with its:

Customers and suppliers

The date that is the end of the accounting period is referred to as the:

Cutoff

When goods are received at the end of the accounting period, and the invoice is not received until after the start of the following period, a problem may arise as to when to record the liability. This is referred to as a(n):

Cutoff issue

Examples of Business Continuity include all of the following except:

Environmental Backup Recovery Plan

Software Programming involves all of the following except:

Data Conversion

This document system is used by systems professionals to show the logical design of a system. The advantage of the method is that it uses only four symbols. Identify the document system

Data Flow Diagram

The process of converting data from human readable form to computer readable form is referred to as:

Data Input

In addition to testing system documentation, auditors should test the three main functions of computer applications. Which of the following is not one of these functions?

Data Storage

An integrated collection of enterprise-wide data that includes five to ten fiscal years of nonvolatile data, used to support management in decision making and planning is referred to as:

Data Warehouse

Which of the following is used to produce management reports that would be used to oversee day-to-day operations?

Data Warehouse

The record detailing the amounts and timing of depreciation for all fixed asset categories, except land and any construction-in-progress accounts, is called:

Depreciation schedule

Engineering is responsible for:

Designing the product and creating the bill of materials and the operations list.

The process of designing the outputs, inputs, user interfaces, databases, manual procedures, security and controls, and documentation of the new system is referred to as:

Detailed Design

The purpose of this phase of systems design is to create the entire set of specifications necessary to build and implement the system.

Detailed design

The systems analysis report, which is sent to the IT governance committee, will inform the committee of all of the following, except:

Detailed design

This type of control is included in the internal control system because it is not always possible to prevent all frauds. They help employees to discover or uncover errors, fraud, or unauthorized events

Detection

High-impact processes (HIPs):

Determine the structure of the data in the data warehouse.

Data mining would be useful in all of the following situations except

Determining customers' behavior patterns.

An IT governance committee has several responsibilities. Which of the following is least likely to be a responsibility of the IT governance committee?

Develop and maintain the database and ensure adequate controls over the database

The process of converting data into secret codes referred to cipher text is called:

Encryption

Which of the following is not a control intended to authenticate users?

Encryption

Large-scale IT systems should be protected by physical access controls. Which of the following is not listed as one of those controls?

Encryption of passwords

Within the planning component of the logistics function, which of the following processes is responsible for preparing bill of materials and the operations list?

Engineering

The main reason that receiving clerks are denied access to purchase order quantities and prices is to:

Ensure that the receiving clerk actually takes the time to verify the accuracy of a delivery before accepting it.

Chapter 2 discusses the different approached that can be used to enhance existing legacy systems. Which approach intends to consolidate, connect, and organize all of the computer applications, data, and business processes (both legacy and new) into a seamlessly interfaced framework of system components?

Enterprise application integration

A multi-module software system designed to manage all aspects of an enterprise usually broken down into modules such as financials, sales, human resources, and manufacturing, is referred to as a(n):

Enterprise resource planning

Instead of completely replacing their systems, organizations often try to use new technology to enhance existing systems. Which of the following is not one of the approaches taken by these organizations?

Enterprise resource planning

The _________ contains the data necessary to conduct day-to-day operations and produce management reports used to oversee day-to-day operations.

Enterprise resource planning system

A process, effected by an entity's board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives is referred to as:

Enterprise risk management

The COSO report, Internal Controls- Integrated Framework, identified interrelated components of internal control. Which of the following is not one of those components?

Enterprise risk management

The rectangle used in an entity relationship diagram is used to represent a(n):

Entity

When discussing entity relationship diagrams, this is considered to be a noun, that represents items in the accounting system:

Entity

This document system is a pictorial representation of the logical structure of databases. It identifies the entities, the attributes of the entities, and the relationship between the entities

Entity Relationship Diagram

This type of system matching takes place without invoices. The receipt of goods is carefully evaluated an, if it matches the purchase order, settlement of the obligation occurs through the system.

Evaluated Receipt Settlement

An It enabled system for purchasing that is an "invoice-less" system is called a(n):

Evaluated receipt settlement

An invoice-less system in which computer hardware and software complete in invoice-less match that is a comparison of the purchase order with the goods received is termed:

Evaluated receipt settlement

Which of the following IT systems is designed to avoid the document matching process and is an "invoiceless" system?

Evaluated receipt settlement

The decision to buy or design software directly follows which step in the system design flowchart?

Evaluation and Selection

The process of assessing the feasibility and fit of each of the alternative conceptual approaches and selecting the one that best fits the organization's needs is called:

Evaluation and Selection

The process of assessing the feasibility and fit of each of the alternative conceptual approaches and selecting the one that best meets the organization's needs is termed:

Evaluation and Selection

There are four primary phases of the IT audit. Which of the following is not one of those phases?

Evidence Audit

Generalized audit software can be used to:

Examine the consistency of data maintained on computer files.

Standard costs are the:

Expected costs based on required resources.

Raw material events can be found in which two processes?

Expenditures and return processes, systems & controls and 2) conversion processes, systems & controls.

E-commerce businesses:

Experience dramatically reduced marketing costs as the result of the expanded market.

This type of audit is performed by independent auditors who are objective and neutral with respect to the company and the information being audited.

External Audit

This computer is similar to a company's intranet except that it does allow access to selected outsiders, such as buyers, suppliers, distributors, and wholesalers

Extranet

Select the correct statement from those provided below.

Extranet access is generally open to select members of the supply chain.

Hardware, software, or a combination of both that is designed to block unauthorized access to an IT system is called:

Firewall

Special journals are created, or established, to record specific types of transactions. Which of the following is not one of the special journals?

Fixed Asset Journal

A detailed listing of the company's fixed assets, divided into categories consistent with the general ledger accounts is called a:

Fixed Asset Subsidiary Ledger

Which of the following is not a part of "adequate documents and records" for fixed assets?

Fixed asset journal

When the data contained in a database are stored in large, two-dimensional tables, the database is referred to as a

Flat file database.

Special journals are:

For regular and recurring transactions.

The use of BPR(Business Process Reengineering) is a two-fold: (1) Aligns business processes with the IT systems used to recorded processes and, (2):

Improves the efficiency and effectiveness of these processes

Internal controls that apply overall to the IT accounting system, that are not restricted to any particular accounting application, are referred to as a(n):

General Controls

Internal controls that apply overall to the IT system are called:

General Controls

The automated controls that affect all computer applications are referred to as:

General Controls

In a manual system, an adjusting entry would most likely be initially recorded in a:

General Journal

Which of the following provides details for the entire set of accounts used in the organization's accounting systems?

General Ledger

Independence in mental attitude is to be maintained in all matters related to the audit engagement. This is one of the generally accepted auditing standards that is part of the:

General Standards

Auditing standards address the importance of understanding both the automated and manual procedures that make up an organization's internal controls and consider how misstatements may occur, including all of the following, except:

How financial statement are printed from the computer

Which of the following is not one of the general types of business processes identified by the testbook?

Human Resource Processes

This department is responsible for maintaining records for each job and each employee within the organization, as well as tracking job vacancies and supporting the company's recruitment efforts.

Human Resources Department

Which of the following activities is not part of the planning component of the logistics function?

Human resource management

The purpose of MRP II was to integrate all of the following into a single database EXCEPT:

Human resources

The department responsible for training production personnel is the:

Human resources department.

The responsible for managing the placement and development of sufficient qualified personnel which includes hiring and training workers as well as maintaining records of their performance is the task of the:

Human resources department.

When payroll is processed using batch processing, which of the following would not be part of the payroll process?

Human resources should prepare control totals and hash totals in order to check the system before the paychecks are generated.

For proper segregation of duties, the department that should authorize new employees for payroll would be:

Human resources.

HTTP stands for:

Hypertext transmission protocol.

Risk assessment is a process designed to:

Identify possible circumstances and events that may affect the business.

When discussing the security of assets and documents, there are many actions that can be taken. Which of the following would not be related to this category of internal control?

Identifying sources of risk and estimating the possibility of that risk

The advantages of cloud-based computing includes all of the following, EXCEPT:

Increased infrastructure - the company has more need for servers and data storage.

Which of the following is NOT a feature of an ERP system's database?

Increased need for data storage within functional areas

Select the correct statement from those provided below.

If sales and inventory are real-time, payroll and production may be batch processing in a well-designed system.

Which of the following statements, regarding ethical considerations in an accounting information system is false?

If there is only one person within the organization with responsibility for maintaining the computer systems, it is not difficult to detect instances of computer fraud

The Evaluation and Selection cycle of the expanded SDLC would not include which of the following steps?

Implement the alternative selected.

An accounting information system serves many functions- which of the following is NOT one of those functions?

Implement the start of a transaction

The big bang approach to implementation means that the company:

Implements all modules and all function areas of the ERP system at one time.

The three major concerns related to database control and security do NOT include:

Inadequate backup.

Financial pressures, market pressures, job-related failures, and addictive behaviors are all examples of which condition of the Fraud Triangle?

Incentive

The reason that detailed data must be collected and stored is: 1. The data must be stored for future transactions or follow-up. 2. The data must be incorporated into the accounting system so that regular financial statements can be prepared. 3. Management needs to examine and analyze data from transactions to operate the organization.

Include 1, 2, and 3 among other reasons.

Which of the following activities in the conversion process does NOT require express authorization?

Initiation of a sales order.

This type of control is intended to ensure the accuracy and completeness of data input procedures and the resulting data:

Input Controls

Field check, limit check, range check and sequence check are all examples of:

Input Validation Checks

Which of the following is NOT an example of a programmed input validation check that would help to detect and prevent keying errors?

Input checks

This type of application control is performed to verify the correctness of information entered into software programs. Auditors are concerned about whether errors are being prevented and detected during this stage of data processing.

Input controls

The forms, documents, screens, or electronic means used to put data into the accounting system are called:

Inputs of the system

A company in Florida provides certified flight training programs for aspiring new pilots of small aircraft. Although awarding a pilot's license requires one-on-one flight time, there is also much preparatory training conducted in classroom settings, The company needs to create a conceptual data model for its classroom training program, using an entity-relationship diagram. The company provided the following information: Floridian Flight, Inc. has 10 instructors who can tach up to 30 pilot trainees per class. The company offers 10 different courses, and each course may generate up to eight classes. Identify the entities that should be included in the entity-relationship diagram:

Instructor, Course, Enrollment, Class, Pilot Trainee

Which of the following computer assisted auditing techniques allows fictitious and real transactions to be processed together without client personnel being aware of the testing process?

Integrated test facility

Which of the following is one of the disadvantages to batch processing?

Integration across business processes is difficult in legacy systems that are batch oriented

The proper sequence of events for the accounting cycle is:

Journalize, post, trial balance, adjusting entries, financial statements, and closing entries

Closing entries are:

Journalized in the general journal.

Which of the following represents a method of managing inventory designed to minimize a company's investment in inventories by scheduling materials to arrive at the time they are needed for production?

Just-in-time (JIT)

Flat file records are:

Kept is sequential order.

A cash payment made by a vendor to an organization's employee in exchange for a sale to the organization by the vendor is termed:

Kickback

Database security includes all EXCEPT:

LAN structure.

The standard format for common forms used in the United States for electronic data interchange (EDI) data transmission is divided into three parts. Which of the following is one of those "parts"?

Labeling Interchanges

When PCs are used for accounting instead of mainframes or client-server system, they face a greater risk of loss due to which of the following:

Lack of backup control

Manufacturing has changed in recent years as a result of each of the following factors except:

Lack of economic prosperity

A situation where the organization's cash is stolen after it is entered in the accounting records is termed:

Larceny

Within the conversion processes, systems and controls result from transactions that are:

Large volumes of daily materials transactions.

Within the revenue and return processes, systems and controls result from transactions that are:

Large volumes of daily sales and cash inflow transactions.

This term refers to moving the current accounting period's cut-off date forward to include sales that correctly occur in a future period. This activity occurs so that the selling company can inflate their sales in the current period.

Leaving sales open

This piece of audit evidence is often considered to be the most important because it is a signed acknowledgment of management's responsibility for the fair presentation of the financial statements and a declaration that they have provided complete and accurate information to the auditors during all phases of the audit.

Letter of Representation

To prevent issues with segregation of duties within an ERP system, the system may do which of the following?

Limit the types of transactions each employee can perform.

Corporations with complex IT systems:

May automate their investment process.

Segregation of duties:

May be more difficult in less complex computerized accounting systems.

Financial statements:

May contain condensed data from the general ledger.

ERP implementation:

May install only selected modules.

Which of the following is one of the disadvantages of maintaining the legacy systems?

May not easily run on new hardware

Periodic inventory systems:

May not reflect current inventory levels.

Variances:

May not result in any changes in the logistics function.

Distributed data processing and databases:

May require management to enforce hardware and software configuration policies.

Which of the following is an example of a B2B transaction?

McDonalds placing an order for more hamburger rolls through their company computer

Which of the following best describes what is meant by the term "generally accepted auditing standards"?

Measures of the quality of an auditor's conduct carrying out professional responsibilities.

Personnel records will typically include all of the following, except:

Medical history subsequent to hiring

Each of the following companies was involved in fraudulent financial reporting during 2001 and 2002, except:

Microsoft Corporation

When categorizing the accounting software market, a company with revenue of $8 million most most likely purchase software from which segment?

Midmarket

A company's cash custody function should be separated from the related cash recordkeeping function in order to:

Minimize opportunities for misappropriations of cash

The theft of any item of value is referred to as:

Misappropriation of assets

Business process reengineering means:

Modifying business processes to take advantage of the capabilities of the ERP system.

The ongoing review and evaluation of a system of internal control is referred to as:

Monitoring

The activity in the conversion process that does NOT require express authorization is the:

Movement of production pieces from one stage of production to the next.

An example of many-to-many relationship would be:

Multiple vendors for multiple items.

The various types of online analytical processing (OLAP) does NOT include:

NOLAP - Notational online analytical processing.

The Internet backbone is the network between:

National backbone providers.

Y2K compatibility issues arose because:

Old computer systems kept dates in mm/dd/yy formats.

The internal control process of requiring the payroll register to be reconciled with the time sheets, will help to minimize the risk of:

Omitted paychecks

The internal control process of having the receiving reports prepared on pre-numbered forms so that the sequence of receipts can be reviewed for proper recording will help to minimize the related risk of:

Omitted purchases

The internal control process that requires vendor statements to be reviewed monthly and reconciled with accounts payable records, will help to minimize the risk of:

Omitted returns

The comparison of the shipping records with the sales journal and invoices is completed to minimize the related risk of:

Omitted transactions

The internal control process of computing and recording the gains/losses for all fixed asset disposals will minimize the risk of:

Omitted transactions

The preparation of deposit slips on prenumbered forms will help to minimize the related risk of:

Omitted transactions

The preparation of packing lists and shipping records on prenumbered forms will help to minimize the related risk of:

Omitted transactions

The preparation of production orders and routing slips on prenumbered forms minimizes the related risk of:

Omitted transactions

The internal processes of e-business do NOT include:

On-line sales to customers.

Which of the following scenarios does NOT impair the independence of a CPA firm from its client?

One of the auditors owns stock in a competitor of the client

Vertical integration of the supply chain occurs when:

One organization owns the supply chain from raw materials through distribution and sales.

Within the logistics function, segregation of duties means:

One person should not have both inventory and accounting responsibilities.

Management fraud may involve:

Overstating revenues

Each of the following items would likely be found in an employee's personnel records related to the initial hiring, except:

Overtime and commission rates

The advantage of client-server computing is:

PC clients perform as "smart" terminals that can accomplish some share of the process tasks

The proper actions and capabilities is:

Packet switching divides large messages into small bundles for tr ansmission while routers determine the best path through the network.

A ________ is prepared by warehouse personnel and lists all items included in a shipment.

Packing slip

This document, prepared by the vendor, is intended to show the quantities and descriptions of items included in the shipment.

Packing slip

Which of the following is not a document that is part of the cash collection process?

Packing slip

This is one of the computer-assisted audit techniques related to processing controls that involves processing company data through a controlled program designed to resemble the company's application. This test is run to find out whether the same results are achieved under different systems.

Parallel Simulation

A system conversion method in which the old and the new systems are operated simultaneously for a short time.

Parallel conversion

Which of the following is not part of the system design phase of the SDLC?

Parallel operation

Which of the following computer assisted auditing techniques processes actual client input data (or a copy of the real data) on a controlled program under the auditor's control to periodically test controls in the client's computer system?

Parallel simulation

Which of the following is NOT one of the rules for the effective use of passwords?

Passwords should not be case sensitive

Payroll transactions are considered:

Periodic events.

Within the administrative processes, systems and controls result from transactions that are:

Periodic.

Appropriate information for a medical facility would NOT include:

Personal spending habits.

Which of the following departments or positions most likely would approve changes in pay rates and deductions from employee salaries?

Personnel

A system conversion method in which the system is broken into modules, or parts, which are phased in incrementally and over a longer period.

Phase-in conversion

Input controls of the IT system would include all of the following EXCEPT:

Physical access controls

Which of the following statements regarding the maintenance of adequate records and documentation in the cash disbursement process is NOT true?

Physical controls should be in place in the areas where cash is retained and disbursed.

This item documents the quantities and descriptions of items ordered. Items from this document should be pulled from the warehouse shelves and packaged for the customer.

Pick List

Best of breed means:

Picking the best software on the market for a particular type of business process for this size of an organization.

A system conversion method in which the system is operated in only one or a few sub-units of the organization.

Pilot conversion

As a metalanguage, XML:

Places a data tag that the beginning and end of each data item identifying the contained data.

The component of the logistics function that directs the focus of operations is the:

Planning component.

The component of the logistics function that directs the focus of operations is referred to as:

Planning.

Capital budgeting:

Plans the capital resources needed to support operations.

Databases that reside in the cloud are called Database as a Service (DaaS). Sometimes the database is combined with an operating system and is referred to as:

Platform as a Service

A method of using hardware and software that captures retail sales transaction by standard bar coding is referred to as:

Point of Sale System

This type of highly integrated IT system processes sales at a cash register in retail stores.

Point of sale

This term refers to a system of hardware and software that captures retail sales transactions by standard bar coding

Point of sale system

Which of the following types of employees are typically required to prepare very detailed (to- the-minute) time reports, identifying the types of projects worked on and the exact time spent on each?

Production employees

The form that authorizes production activities for a particular sales order or forecasted needs is referred to as the:

Production orders.

Which of the following correctly states a reconciliation process to be completed related to payroll?

Production reports to the general ledger.

This schedule outlines the specific timing required for a sales order, including the dates and times designated for the production run.

Production schedule

The operations component of the logistics function has which of the following elements?

Production.

This concept means that the auditors should not automatically assume that their clients are honest, but that they (the auditors) must have a questioning mind and a persistent approach to evaluating evidence for possible misstatements.

Professional Skepticism

In the detailed design stage of systems design it is necessary that the various parts of the system be designed. The parts of the system to be designed at this point would include all of the following, except:

Program Code

Accountants have some form of use of the AIS in all but which role?

Programmer

The existence of IT-based business processes, that result in the details of the transactions being entered directly into the computer system, increases the likelihood of the loss or alternation of data due to all of the following, except:

Programmer Incompetence

Accountants have several possible roles related to accounting information systems. Which of the following is not normally one of those roles?

Programmer of the AIS

All of the following are implementation of software systems EXCEPT:

Progressive implementation.

The analytics module of an ERP system such as SAP would include all of the following EXCEPT:

Project portfolio management

A source document serves important functions in the accounting system. which of the following is not one of those functions?

Provides the output data for financial reports

This organization, established by the Sarbanes-Oxley Act, was organized in 2003 for the purpose of establishing auditing standards for public companies.

Public Company Accounting Oversight Board

This form of encryption uses a public key, which is known by everyone, to encrypt data, and a private key, to decode the data

Public key encryption

The form, or source document, that conveys the details about a customer's order, prepared by the customer, is referred to as:

Purchase Order

A company may reject goods received due to a number of reasons. The process related to this is referred to as:

Purchase Returns

A record keeping tool used to record purchases in a manual accounting system. This "tool" would consist of recording all of the purchased orders issued to vendors in a chronological order.

Purchase journal

The business processes that are common in company-to-company sales business are divided into three groups. Which of the following is not one of those groups?

Purchase of inventory, including ordering, delivery, and billing

Routine business transactions would include which of the following?

Purchase of merchandise inventory.

This form is issued by the buyer, and presented to the seller, to indicate the details for products or services that the seller will provide to the buyer. Information included on this form would be: products, quantities, and agreed-upon prices.

Purchase order

It is important that documentation support or agree with an invoice before payment is approved and a check is issued. Which documents should be matched to make sure that the invoice received relates to a valid order that was placed and that the goods were received?

Purchase order, receiving report, and invoice.

A company's database contains three types of records: vendors, parts, and purchasing. The vendor records include the vendor number, name, address, and terms. The parts records include part numbers, name, description, and warehouse location. Purchasing records include purchase numbers, vendor numbers (which reference the vendor record), part numbers (which reference the parts record), and quantity. What structure of database is being used?

Relational

Database management systems are categorized by the data structures they support. In which type of database management system is the data arranged in a series of tables?

Relational

ERP software operates on a(n) _________ database

Relational

A collection of data stored in several small two-dimensional tables that can be joined together in many varying ways to represent many different kinds of relationships among the data is referred to as a(n):

Relational Database

Which type of database is the most widely used database structure today?

Relational databases

The diamond used in an entity relationship diagram is used to represent a(n):

Relationship

The documentation accompanying payment that identifies the customer account number and invoice to which the payment applies is referred to as a(n):

Remittance Advice

A tear-off part of a check that has a simple explanation of the reasons for the payment is called:

Remittance advice

Companies who provide mobile devices for employees, normally has a policy that allows the company's IT professional to remove company data and applications from the mobile device. This process is referred to as:

Remove wipe

Which of the following is NOT a benefit of the electronic transfer of payroll funds?

Removes the need for bank statement reconciliations

The process of risk assessment would include all of the following actions, except:

Report the risks to the audit committee

The general guidelines, known as the generally accepted auditing standards, which include the concepts of presentation in accordance with the established criteria, the consistent application of established principles, adequate disclosure, and the expression of an opinion, relate to the:

Reporting Standards

Variances:

Represent the differences between actual costs and the standard costs applied.

The primary key of a relational database:

Represents a value that is used to sort, index, and access records with.

This document is sent to each software vendor offering a software package that meets the user and system needs and is sent to solicit proposals.

Request for Proposal

Just-in-time (JIT) production systems:

Require closely controlled inventory levels.

Capital or investment processes:

Require established procedures and internal controls even though they are considered infrequent events.

Which of the following is a characteristic of a non-routine transaction?

Required to have specific authorization.

Select the false completion to the statement which starts "A computer-based conversion process:"

Requires less data input into the system.

Data normalization:

Requires repeated groups to be deleted from the same column.

Capital or investment processes:

Requires the specific approval of top management or board of directors.

Which of the following processes focuses on product improvement?

Research and development

The responsibility to conduct make/buy decisions is usually given to:

Research and development.

Security of assets and documents include all of the following except:

Restricted movement of office supplies.

During the 1970s and 1980s, the ARPANET was:

Restricted to universities, libraries, and research organizations.

Organizational benefits of ERP implementation include all EXCEPT:

Retaining long-held work patterns and work focus.

Circumstances within a company, related to sales returns, that indicate a high level of risk include all of the following, except:

Returns are received a one location with credit memos issued at the same location.

For proper segregation of duties in cash disbursements, the person who signs checks also:

Returns the checks to accounts payable.

The expenditure and return process is similar to the _______ process, except that goods and cash flow in the opposite direction.

Revenue

When a company receives returned goods from a customer, the business process to accept the return would most likely be a(n):

Revenue process

When additional procedures are necessary to bring a defective product up to its required specifications, this is referred to as:

Rework.

Which management assertion determines that transactions and related asset accounts balances are actually owned and that liability account balances represent actual obligations?

Rights and Obligations

Over the next few years, spending on ERP systems is expected to:

Rise

The likelihood that errors or fraud may occur is referred to as:

Risk

One of the components of internal control identified by COSO required that management must be considering threats and the potential for risks, and stand ready to respond should these events occur. This component is referred to as:

Risk Assessment

Which of the following is not one of the corporate functions interrelated within the corporate governance system?

Risk Assessment

The range of actions that make up the component of internal control referred to as control activities includes each of the following, except:

Risk assessment

A fraudster uses this to alter a program to slice a small amount from several accounts, crediting those small amounts to the perpetrator's benefit.

Salami technique

A special journal that is used to record sales transactions and is periodically posted to the general ledger.

Sales Journal

A _______ is a credit to the customer account made to compensate the customer for a defective product or a late shipment.

Sales allowance

Interfaces between modules of ERP systems would be accepted for all of the following EXCEPT:

Sales and human resources.

A service firm would focus on:

Sales and project status.

Availability risks, related to the authentication of users would include:

Shutting down the system and shutting down programs

A situation where the organization's cash is stolen before it is entered in the accounting records is termed:

Skimming

Quickbooks and Peachtree would be part of which market segment of accounting software?

Small Segment

This item, that strengthens the use of passwords, is plugged into the computer's card reader and helps authenticate that the use is valid; it has an integrated circuit that displays a constantly changing ID code. These statement describe:

Smart card

This type of client terminal can accomplish some of the processing tasks in a client- server computing network:

Smart terminal

Which of the following is not an example of physical characteristics being used in biometric devices?

Social security number

There are a number of cloud computing services, and one of those services is called SaaS. This acronym stands for:

Software as a Service

Database management systems, DBMS, is (are):

Software that manages a database and controls access and use of data

The study of the current system to determine the strengths and weaknesses and the user needs of that system is called:

Systems Analysis

This phase of SDLC requires the collection of data about the system and the careful scrutiny of those data to determine areas of the system that can be improved.

Systems Analysis

The creation of the system that meets user needs and incorporates the improvements identified by the systems analysis phase is called:

Systems Design

The formal process that many organizations use to select, design, and implement IT systems is the:

Systems Development Life Cycle

The set of steps undertaken to program, test, and activate the IT system as designed in the system design phase is called:

Systems Implementation

The evaluation of long-term, strategic objectives and prioritization of the IT systems in order to assist the organizations in achieving its objectives is called:

Systems Planning

This phase of SDLC involves the planning and continuing oversight of the design, implementation, and use of the IT systems.

Systems Planning

Which is the correct flow of the SDLC?

Systems Planning, Systems Analysis, Systems Design, Systems Implementation, Operation and Maintenance

The phases of the SDLC include all of the following except:

Systems Purchasing

Which phase of the system development life cycle includes determining user needs of the IT system?

Systems analysis

Which of the following must a company have in place to capture, record, summarize and report transactions?

Systems and processes

The network lines that are used to connect regional ISPs to the backbone are usually:

T3 Lines

Structured query language (SQL):

Takes advantage of the primary record key to link tables.

Scheduling:

Takes into consideration all the open sales orders.

Which of the following statement is false related to client-server computing?

Tasks are assigned to either the server or the client based on the size of the task

The assessment of the realism of the possibility that technology exists to meet the need identified in the proposed change to the IT system is called:

Technical Feasibility

Which of the following feasibility aspects is an evaluation of whether the technology exists to meet the need identified in the proposed change to the IT system?

Technical feasibility

The work arrangement where employees work from home using some type of network connection to the office is referred to as:

Telecommuting

Each of the following are methods for implementing a new application system except:

Test

The most common way to test software is to use which of the following?

Test Data

Audit procedures designed to evaluate both general controls and application controls are referred to as:

Test of Controls

Studies show:

That for day-to-day operations unit data is the critical element.

The additive characteristic means:

That if the preceding rules are met, the rule can be met.

The acquisition of materials and supplies and the related cash disbursements is referred to as:

The Procurement Process

The choice of accounting information system will depend on all of the following except:

The ability of the company to capture information

The shortcomings of a spreadsheet-based system include all of the following, except:

The abundance of fixed asset data

Documentation of the accounting system allows:

The accountant to analyze and understand the procedures and business process and the systems that capture and record the accounting data

In order to master risks and controls and how they fit together, which of the following is NOT one of the areas to fully understand?

The accounting information system

IT systems have dramatically affected many aspects of business. Which of the following is not one of the changes?

The accounting information that is reported by the system

Internal controls related to the purchase returns would include all of the following, except:

The accounts payable employee who prepares the debit memo should also be responsible for handling the inventory and approving the return

The factor that does NOT affect internal reports is:

The audit status of the organization.

The IT auditing approach referred to as "Auditing through the system" is necessary under which of the following conditions?

The auditor wants to test computer controls as a basis for evaluating risk and reducing the amount of substantive audit testing required.

The advantage of "best of the breed" is:

The best functionality of a unique process of the organization.

The audit practice of "auditing around the computer" is also referred to as:

The black box approach

Standard costs take into consideration all of the following except:

The cost of the sales manager's salary.

The data in the data warehouse are said to be enterprise-wide because:

The data are pulled from each of the operational databases and maintained in the data warehouse for many fiscal periods

Within an ERP program:

The data warehouse contains five to ten years of transaction histories.

Select the true statement from those provided below.

The data warehouse has five to ten years of data while the operational database has current year data.

Within the revenue processes, a signed approval of a sales order indicates all of the following except:

The date of delivery.

Which of the following would represent proper segregation of duties?

The employee who opens mail containing checks prepares a list of checks received.

Good corporate governance depends mainly upon ________.

The ethical conduct of management

The systems transition responsible for moving business processes from an internal management perspective to an interactive, internal, and external perspective is?

The evolution of ERP systems into ERP II systems

Which of the following statements is NOT true regarding source of capital transactions?

The fact that these transactions and processes cannot occur without oversight by top management means other controls are not necessary.

As computerized accounting systems get more and more complex and integrated:

The level of authorization for posting gets lower in the level of responsibilities.

The four general purpose financial statements are:

The four general purpose financial statements are:

Regarding subsidiary ledgers and general ledger control accounts, which of the following is NOT true?

The general ledger maintains details of subaccounts.

Factors that indicate the need for internal controls over fixed assets processes include all of the following, except:

The high cost of assets

The control environment component of internal control was identified to have a number of different factors. Which of the following is NOT one of those factors?

The identification of sources of risk

Which of the following is not considered a cause for information risk?

The information has been tested by internal auditors and a CPA firm.

The two tiers of ERP systems are:

The large, multinational corporation tier and the midsize business tier.

Benefits of an ERP system include all of the following EXCEPT:

The real-time nature of processing increases the total processing time.

Internal control is strengthened by the use of a blind purchase order, upon which the quantity of goods ordered is intentionally left blank. This blind copy is used in which department?

The receiving department.

Select the correct statement from those provided.

The relational database model is more flexible in its queries than the hierarchal mode.

Which of the following statements best describes the risks of ERP systems?

The risks of implementing and operating ERP systems are nearly identical to the risks of implementing and operating IT systems.

The issuance and movement of materials into the various production phases is referred to as:

The routing process.

Which document provides the descriptions and quantities of materials taken into production for a specified sale or other authorized production activity?

The routing slip.

Which of the following is not an independent verification related to cash disbursements?

The stock of unused checks should be adequately secured and controlled.

If a manufacturing company's inventory of supplies consists of a large number of small items, which of the following would be considered a weakness in internal controls?

The stores function is responsible for updating perpetual records whenever inventory items are moved.

Select the true statement from the following:

The strength of Peoplesoft is its human resources capabilities.

Which of the following would be considered a vendor fraud?

The submission of duplicate or incorrect invoices

To ensure that all credit sales transactions of an entity are recorded, which of the following controls would be most effective?

The supervisor of the billing department matches prenumbered shipping documents with entries recorded in the sale journal.

Which of the following is not true of the supply chain?

The supply chain excludes customers

Which of the following is one of the advantages of maintaining a legacy system?

The system often supports unique business processes not inherent in generic accounting software

Organizations are often reluctant to abandon their legacy systems because:

The system was customized to meet specific needs

Examples of employee initiated fraud would NOT include:

The theft of cash or checks from the mailroom.

IT Controls can be divided into two categories, general controls and application controls. Which of the following is an example of a general control?

The use of passwords to allow only authorized users to log into an IT-based accounting system

IT Controls can be divided into two categories, general controls and application controls. Which of the following is an examples of a general control?

The use of passwords to allow only authorized users to log into an IT-based accounting system

When transactions are posted in a computerized accounting system:

The user can select which batches of transactions to post.

When a sales transaction has been authorized, by the signature of the designated employee, it means that the designated employee has done all of the following, except:

The vendor's credit has been approved

Which of the following is NOT part of an administrative process?

The write-off of bad debts

Accounting software traditionally uses two different types of files. The file type that is the set of relatively temporary records that will be process to update the permanent file is referred to as a(n):

Transaction File

The information from a purchase must flow into the purchase recording systems, the accounts payable and cash disbursement systems, and the inventory tracking systems. In an IT accounting system, these recording and processing systems are called:

Transaction Processing Systems

When a sale occurs, the information resulting from that sale must flow into the sales recording systems, the accounts receivable and cash collection systems, and the inventory tracking systems. In IT accounting systems, these recording and processing systems are referred to as:

Transaction Processing Systems

In automated accounting:

Transaction information may be held in a special module awaiting posting.

What common characteristic is shared by both online processing and real-time processing?

Transactions are entered and processed individually

Internal processes of the organization include all of the following EXCEPT:

Transactions involving suppliers.

Which of the following is a risk that may affect the revenue and cash collection process?

Transactions may be recorded in the wrong amount

Each category of processes in the typical purchasing system would include controls and risks. For each of the categories, the goal of the internal controls system is to reduce specific types of business risks. Which of the following is not one of those risks?

Transactions properly accumulated or transferred to the correct accounting records.

The risks that may affect the revenue and cash collection processes include all of the following, except:

Transactions recorded by the wrong company.

TCP/IP is:

Transmission control protocol/Internet protocol.

Which of the following items is not one of manual records in a manual accounting systems?

Trial Balance

Which of the following symbols would not be seen in a process map?

Triangle

A small, unauthorized program within a larger legitimate program, used to manipulate the computer system to conduct a fraud is referred to as a(n):

Trojan horse program

Which of the following would be referred to as a common carrier?

Trucking company

A benefit of a company accounting for their documents in a numerical sequence is that it is much easier to see if a document or documents are missing.

True

A business process has a well-defined beginning and end

True

A challenging area of payroll computation is computing the amount of deductions related to each employee's pay.

True

A character is a single letter, number, or symbol.

True

A cloud-based ERP system will require less infrastructure at the company.

True

A code of ethics should reduce opportunities for employees to conduct fraud if management emphasizes the cost and disciplines or discharges those who violate it

True

A company is more likely to implement internal controls if they view the cost of the controls to be less than the benefits provided.

True

A computer network coving a small geographic area is referred to as a LAN

True

A field is a set of characters that fill a space reserved for a particular kind of data.

True

A firewall can prevent the unauthorized flow of data in both directions

True

A good set of internal controls may not be as effective in reducing the chance of management fraud as it would be in reducing the chance of fraud committed by an employee

True

A hiring decision normally occurs as the result of an interview or interviews and is documented on a signed letter and / or signed employment contract.

True

A protocol is a standard data communication format that allows computers to exchange data.

True

A purchase requisition is essentially an internal document, one that does not go outside the company, whereas a purchase order is an external document, which will be presented to an entity outside the company.

True

A record is the entire set of fields for a specific entity.

True

A relational database stores data in two-dimensional tables that are joined in many ways to represent many different kinds of relationships in the data.

True

A sample is random when each item in the population has an equal chance of being chosen.

True

A system of local area networks connected over any distance via other net work connections is called a WAN, or wide area network

True

A validity check is an example of an input application control

True

A web server is a computer and hard drive space that stores web pages and data.

True

Absorption costing involves the inclusion of both variable and fixed costs in the determination of unit costs for ending inventories and cost of goods sold.

True

When the manager of the primary users of the system is satisfied with the system, an acceptance agreement will be signed , the enforce of which makes it much more likely that project teams will seek user input and that the project team will work hard to meet user needs.

User Acceptance

During the operation of an IT system, it is necessary that regular reports are received by management to monitor the performance of the system. These reports would include all of the following, except:

User Acceptance of the IT System

HTML allows:

User level computers a way to display information the way it was intended to be displayed.

The assigning of access and authority for a specific user ID is called a ________.

User profile

This should be established for every authorized user and determines each user's access level to hardware, software, and data according to the individual's job responsibilities

User profile

A company has stated that the main strategic objective is to improve the accounts payable function within the organization. There are limited resources for IT upgrades and modifications. The IT governance committee has received IT update requests from the public relations department, human services, and vendor satisfaction department. Given this information, which would likely be the first upgrade implemented?

Vendor satisfaction would be first because it would be most in line with the strategic objective of the company.

Common types of independent checks within the revenue process include all of the following, except:

Verification of the bank statement and the cash account in the general journal.

Which of the following displays the correct order of operations within the Sales Process?

Verify Prices, Prepare Sales order, verify credit limit, verify item is in stock

Client systems usually rely on the network for all EXCEPT:

Video presentation.

Which of the following is not a method of data input?

Viewed on the screen

Authorized employees may need to access the company IT system from locations outside the organization. These employees should connect to the IT system using this type of network

Virtual private network

The type of network uses tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data

Virtual private network

A self-replicating piece of program code that can attach itself to other programs and data and perform malicious actions is referred to as a(n):

Virus

A company must have systems in place to accomplish all of the following except:

Vocalize data.

The process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees is called:

Vulnerability assessment

This method of monitoring exposure can involve either manual testing or automated software tools. The method can identify weaknesses before they become network break-ins and attempt to fix these weaknesses before they are exploited

Vulnerability assessment

Auditors may send text messages through a company's system to find out whether encryption of private information is occurring properly. In addition, special software programs are available to help auditors identify weak points in a company's security measures. These are examples of:

Vulnerability assessments

These tests of security controls analyze a company's control environment for possible weaknesses. Special software programs are available to help auditors identify weak points in their company's security measures.

Vulnerability assessments

The examination of the system to determine the adequacy of security measures and to identify security deficiencies is called:

Vulnerability testing

A character is to a field as

Water is to a pool.

Potential variations in conditions that are used to understand interactions between different parts of the business is referred to as:

What-if simulations.

Corrections to posting errors are made:

When discovered.

Data redundancy occurs:

When inventory has the same data in its files as sales has in its files.

A group of LANs connected to each other to cover a wider geographic area is called a:

Wide area network

This encryption method, used with wireless network equipment, is symmetric in that both the sending and receiving network nodes must use the same encryption key. It has been proven to be susceptible to hacking

Wired Equivalency Privacy (WEP)

This encryption method requests connection to the network via an access point and that point then requests the use identity and transmits that identity to an authentication server, substantially authenticating the computer and the user

Wireless Protection Access (WPA)

Information captured by a system is generated by financial transactions:

Within the organization and between an organization and its customers and vendors

Spending on ERP systems increased or decreased based on several factors. These factors include all of the following EXCEPT:

Y2K compliance concerns

When a valid URL is entered into your web browser:

Your computer will send an http command to a web server, directing the server to find and transmit the web page requested.

Which of the following is least likely to be an output of the accounting information system?

a bar code

Which of the following is not a good example of an effective password?

a1b2c3

In the cash receipts process, what must take place directly after preparing the cash receipts journal?

both A and B

Which of the following documents will be received by a customer after a sale?

monthly account statement

In the case of a manual accounting system, wages and payroll deductions would not be posted to the general ledger until the ________ forwards a signed journal voucher, giving the authorization.

payroll department


Conjuntos de estudio relacionados

Property/Casualty CH.6 EXAM QUESTIONS

View Set

Africa's Climate & Vegetation Reading Notes (Ch. 18.2)

View Set

Starting Out with Python, 2e Chapter 13 (Ch.12)

View Set

Anthropology Quiz 2 Chapter 3 +4

View Set