final da

Ace your homework & exams now with Quizwiz!

phase 1

completeness and accuracy The purpose of Phase 1 reconciliation process is to test client-provided account information for completeness and accuracy.

ff1

completeness and accuracy, in excel Make certain that your data is complete and accurate before performing any analysis, using Excel

Every citizen in the United States has one social security number, but no two citizens have the same social security number. Thus, the cardinality that exists between social security numbers and citizens is A one-to-one. B one-to-many. C many-to-many.

1-to-1

Which of the following transactions is represented by the diagram below? [Sale]--0:1------1:1--[Take customer order] A Each sale is associated with a single order, and there is a time lag between the time an order is taken and delivery of the product. B Each sale can be comprised of multiple orders, and each order can be associated with multiple sales or no sales. C Each sale can be comprised of multiple orders, and each order can be associated with one or more multiple sales. D Each sale is associated with a single order and, there is no time lag between the time an order is taken and delivery of the product.

A Each sale is associated with a single order, and there is a time lag between the time an order is taken and delivery of the product.

Which of the following is not an example of misappropriation of assets? A The chief financial officer of the company falsely adds $20 million to the accounts receivable and revenue accounts. B The treasurer of the company makes an unauthorized wire transfer from the organization's bank to a personal account in Grand Cayman. C A warehouse employee takes home two units of electronic entertainment inventory each week without authorization. D The president of the company utilizes the organization's cash to add a floor to her 15,000 square foot house.

A The chief financial officer of the company falsely adds $20 million to the accounts receivable and revenue accounts.

Which of the following statements is true about the development of an REA model? A The objective is to model basic value chain activities. B Information retrieval events are modeled as events in the REA model. C Events that pertain to the entry of data are included in the REA model. D REA diagrams model individual transactions and data collections.

A The objective is to model basic value -chain activities.

Data diddling is A changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data. B inserting a sleeve into an ATM so that it will not eject the victim's card, pretending to help the victim as a means of obtaining his PIN, and using the card and PIN to drain the account. C verifying credit card validity; buying and selling stolen credit cards.

A changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.

The two most common types of fraud impacting financial statements are A fraudulent financial reporting and misappropriation of assets. B corruption and fraudulent financial reporting. C misappropriation of assets and embezzlement. D fraudulent financial reporting and e-commerce fraud.

A fraudulent financial reporting and misappropriation of assets.

The maximum cardinality of any REA diagram relationship is A one or many. B zero or many. C zero or one. D many or none.

A one or many.

Megan has purchased a brand new laptop about three months ago. Recently, she feels that her computer is operating much more slowly and sluggishly than before. Since purchasing the computer, Megan had been accessing the Internet and had installed a variety of free software. The problem is mostly likely to be A a sluggishness infection. B a virus. C a spoof.

A Virus

Identify the item below that would be classified as an event by the REA data model. A An IOU from a customer. B The customer. C A customer sale. D A loan from a vendor.

A customer sale

What is a SQL injection attack? A It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program. B It is an attack when the perpetrator is inputting so much data that the input buffer overflows. The overflow contains code that takes control of the company's computer. C It is an attack when the perpetrator uses software to guess company's addresses, send employees blank e-mails, and add unreturned messages to spammer e-mail list. D It is an attacked when the perpetrator sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server.

A.) It is an attack when the perpetrator is inserting malicious query in input such that it is passed to and executed by an application program.

Which of the following websites likely poses the most fraud and security risk? A A social media website B A file sharing website C Your school's website D Your personal website

B A file sharing website

Which of the following is not a way to reduce fraud losses? A Maintain adequate insurance. B Conduct periodic external and internal audits. C Store backup copies of program and data files. D Use software to monitor system activity.

B Conduct periodic external and internal audits.

Landry, a system analyst for a national department store, was tasked to identify previously unknown relationships in the company's sales data that can be used in future promotions. What technique would Landry most likely use? A Data exploring B Data mining C Customer auditing D Customer resource management

B Data mining

Which is probably the most immediate and significant effect of database technology on accounting? A Elimination of traditional records such as journals and ledgers. B Quicker access to and greater use of accounting information in decision-making. C Replacement of the double entry-system. D Change in the nature of financial reporting.

B Quicker access to and greater use of accounting information in decision-making.

Which of the following statements is false regarding REA diagrams? A An REA diagram for a given organization will change over time. B Redrawing an REA diagram several times during development is uncommon. C Each organization will have its own unique REA diagram. D Data modeling and REA diagram development involve complex and repetitive processes.

B Redrawing an REA diagram several times during development is uncommon.

A set of individual user views of the database is called the A conceptual-level schema. B external-level schema. C internal-level schema. D meta-schema.

B external-level schema.

The logical view of a database system refers to A how master files store data values used by more than one application program. B how a user or programmer conceptually organizes and understands the data. C how and where the data are physically arranged and stored. D how the DBMS accesses data for a certain application program.

B how a user or programmer conceptually organizes and understands the data.

The database design method in which a designer uses knowledge about business processes to create a diagram of the elements to be included in the database is called A geometric data modeling. B semantic data modeling. C decentralization. D normalization.

B semantic data modeling.

The REA data model A classifies data into relationships, entities and accounts. B was developed specifically for use in designing accounting information systems. C is used in many areas of business and science. D is a graphical technique for portraying a database schema.

B was developed specifically for use in designing accounting information systems.

______________ includes carefully monitoring system performance and user satisfaction to determine the need for making system enhancements and modifications. A Implementation and conversion B Physical design C Operation and maintenance

C Operation and maintenance

Which is a true statement about the REA data model? A Using an REA data model is not helpful when creating an R-E diagram. B The term REA is an acronym that stands for resources, entities, and activities. C The REA data model classifies entities into three distinct categories. D The term REA is an acronym that stands for resources, entities, and agents.

C The REA data model classifies entities into three distinct categories.

Using the database depicted below, "Date" is best described as answerable question reference A an attribute. B a primary key. C a non-key attribute. D a foreign key.

C a non-key attribute.

What acts as an interface between the database and the various application programs? A database administrator B database system C database management system D data warehouse

C database management system

Identify one potential drawback in the design and implementation of database systems for accounting. A Relational DBMS query languages will allow financial reports to be prepared to cover whatever time periods managers want to examine. B Relational DBMS provide the capability of integrating financial and operational data. C Relational DBMS can accommodate multiple views of the same underlying data; therefore, tables storing information about assets can include data about both historical and replacement costs. D Double -entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy.

D Double -entry accounting relies on redundancy as part of the accounting process, but well-designed database systems reduce and attempt to eliminate redundancy.

What was the first known cyber-attack intended to harm a real-world physical target? A Sasser B Doomsday C Michelangelo D Stuxnet

D Stuxnet

It is industry standard to model relationships as in entity-relationship diagrams. A diamonds B ovals C rectangles D There is no industry standard.

D There is no industry standard.

Which of the following is an example of processor fraud? A A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks. B The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities. C A person used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills. D Two accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.

D Two accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.

The technique of using queries to investigate hypothesized relationships among data is called A business intelligence. B data analysis. C data mining. D online analytical processing.

D online analytical processing.

Databases were originally developed to address which problem? A.) to increase the speed that an organization could process transactions B.) to decrease the costs associated with manual accounting systems C.) to replace the double entry-system D.) to address the proliferation of master files

D.) to address the proliferation of master files

When a computer criminal gains access to a system by searching through discarded records, this is referred to as A dumpster diving. B data diddling. C eavesdropping. D data squatting.

Dumpster Diving

Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as A hacking. B spamming. C posing. D hijacking.

Hijacking

Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization? A Pressure B Opportunity C Rationalization D Concealment

Opportunity

Sending an unsolicited message to many people at the same time is known as A hacking. B posing. C spamming. D hijacking.

Spamming

The day after Christmas, Jane Olson, Chief Information Officer at American Trading Corporation (ATC), received some bad news. The hard drive use to store the company's system data backups was lost while it was being transported to an offsite storage location. Jane called a meeting of her technical staff to discuss the implications of the loss. Which of the following is most likely to relieve her concerns over the potential cost of the loss? A ATC has a copy of the hard drive onsite, so a new copy for storage offsite can easily be prepared. B The shipper has insurance that will reimburse ATC for the cost of the hard drive. C The hard drive was encrypted and password protected. D ATC has a comprehensive disaster recovery plan.

The hard drive was encrypted and password protected.

A back door into a system that bypasses normal system controls is called a A logic bomb. B trap door. C data diddle. D virus.

Trap Door

A set of unauthorized computer instructions in an otherwise properly functioning program is known as a A logic bomb. B trap door. C spyware. D trojan horse.

Trojan Horse

Which type of threat poses the greatest risk to information systems? A Software errors and equipment malfunctions B Intentional acts (computer crimes) C Unintentional acts D Natural and political disasters

Unintentional acts

A person used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills.

Which of the following is an example of input fraud? A A fraud perpetrator scanned a company paycheck, used desktop publishing software to erase the payee and amount, and printed fictitious paychecks.. B The office manager of a Wall Street law firm sold information to friends and relatives about prospective mergers and acquisitions found in Word files. They made several million dollars trading the securities. c A person used desktop publishing to prepare bills for office supplies that were never ordered or delivered and mailed them to local companies. The invoices were for less than $300, an amount that often does not require purchase orders or approvals. A high percentage of the companies paid the bills. D Two accountants without the appropriate access rights hacked into Cisco's stock option system, transferred over $6.3 million of Cisco stock to their brokerage accounts, and sold the stock. They used part of the funds to support an extravagant lifestyle, including a $52,000 Mercedes-Benz, a $44,000 diamond ring, and a $20,000 Rolex watch.

ff5

analyses to determine correct acct balances Prepare a runoff analysis; Calculate cash receipts; Determine what amount of accounts receivable balance you believe is collectible

ff2

analytics for risk assessment perform appropriate analytics techniques to inform your risk assessment for the order-to-cash cycle

phase 2

anomalies and fraud The purpose of Phase 2 is to test client-provided manual journal entry account information for anomalies and a heightened risk of fraud.

Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft? A bogus expense B kiting C lapping D laundering

c lapping

lemonade stand

create data learned how to create data

Which of the following is the easiest method for a computer criminal to steal output without ever being on the premises? A dumpster diving B electronic eavesdropping on computer monitors C use of a Trojan horse D using a telescope to peer at paper reports

electronic eavesdropping on computer monitors

ff4

proposed AR adj. Proposed Accounts Receivable Adjustments


Related study sets

APK3220 Quiz Questions Compilation

View Set

Cybercrime- Test #1 potential questions

View Set

Midterm 1 Review (Units 1, 2, 8, 9, 10 of The Economy)

View Set

Infant physical development, infant perceptual development, sensorimotor stage

View Set

Psychology: Ch. 8, Part 1_Mental Representation

View Set

Brain Rules by John Medina & Other Facts

View Set

Leadership Test 1 Sample NCLEX from Pearson

View Set