Search
Info
Warning
Danger

Study Resources (Accounting)

11) ________ is the classification, accumulation, and reporting of data that help users understand and evaluate organizational performance. A) Scorekeeping B) Attention directing C) Problem solving D) Cost accounting 12) Generally Accepted Accounting Principles are most closely connected to ________. A) management accounting B) financial accounting C) internal auditing D) management accounting 13) What type of information is used in.
1 Views
View Answer
21) The membership of a steering committee is determined by the CEO and other members of the executive staff. 22) Organizations outsource projects to engage its management team in their free time. 23) Gaining economies of scale is an advantage of outsourcing. 24) Implementation risk is increased by outsourcing IS services. 25) Acquiring.
3 Views
View Answer
Multiple Choice 1) ________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Cooperation B) Groupthink C) Collaboration D) Dissolution 2) Which of the following is true of collaboration? A) Iterations should be avoided for the smooth functioning of the collaborative process. B) Group members.
3 Views
View Answer
31) The creation of backup copies of database contents ensures the protection of the database. 32) The loss of encryption keys by employees is referred to as key escrow. 33) In an organization, the security sensitivity for each position should be documented. 34) The existence of accounts that are no longer necessary.
1 Views
View Answer
31) Unless the contract requires otherwise, an outsource vendor can choose the technology that it wants to implement. 32) The potential loss of intellectual capital is a concern related to outsourcing. 33) When a company outsources a system, it has complete control over prioritizing software fixes. 34) Parting business with an outsource vendor.
1 Views
View Answer
21) With the ________ collaboration tool set, a participant should be able to collaborate with his team, though he will get little support from the software. A) minimal B) optimal C) good D) comprehensive 22) With the ________ collaboration tool set, a participant has the ability to conduct multiparty audio and video virtual meetings, and.
0 Views
View Answer
1) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge. 2) Pretexting occurs when someone deceives by pretending to be someone else. 3) Spoofing is a technique for intercepting computer communications. 4) Email spoofing is a synonym for phishing. 5) Drive-by.
6 Views
View Answer
11) Systems that provide version management track changes to documents and provide features and functions to accommodate concurrent work. 12) A Google account is not essential to access Google Drive. 13) Version management systems provide version control. 14) In version-control systems, shared documents are often placed in shared directories, called libraries. 15) The document.
1 Views
View Answer
21) Product life cycles ________. A) do not pertain to services offered to customers B) are the same length for all products C) are not important when predicting revenues from a product D) must be considered to effectively plan and control production of goods or services 22) Variances are deviations from planned results. 23) Management by.
2 Views
View Answer
11) An example of a staff department at a clothing manufacturer is the ________. A) pressing department B) cutting department C) sewing department D) maintenance department 12) According to the Financial Executives Institute, a function of the controller is ________. A) investments B) short-term financing C) provision of capital D) reporting and interpreting 13) According to the Financial Executives Institute,.
1 Views
View Answer
11) Which of the following is a content sharing technique in which the sender does not have any control or record of changes made to the shared content? A) email with attachments B) Windows WebApps C) Google Docs D) blog 12) Which of the following statements is true of shared content with version management? A) Content.
0 Views
View Answer
11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. A) Usurpation B) Encryption C) Spoofing D) Sniffing 12) A(n) ________ is a sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments. A) Advanced Persistent Threat (APT) B) Advanced Volatile Threat (AVT) C) local.
1 Views
View Answer
11) Team rules are established during the planning phase of project management. 12) Most collaboration systems are hosted on client computers. 13) Schedules, tasks, budgets, and other managerial data are examples of project metadata. 14) The primary function of a collaboration information system is information security. .
0 Views
View Answer
21) Specialization by individuals in organizations is being replaced by decision-making by cross-functional teams. 22) One of a controller's responsibilities is risk management. 23) One of a treasurer's responsibilities is tax administration. 24) The controller is primarily concerned with a company's financial matters and the treasurer is concerned with a company's operating matters. 25).
2 Views
View Answer
11) A person should preferably use the same password for different sites so as to avoid confusion. 12) While making online purchases, a person should buy only from vendors who support https. 13) Risk management is a critical security function of an organization's senior management. 14) Financial institutions must invest heavily in security.
0 Views
View Answer
1.1   Questions 1) ________ is the field that produces information for managers within an organization. A) Financial accounting B) Management accounting C) Financial auditing D) External auditing 2) The primary users of management accounting information are ________. A) bankers B) governmental regulatory bodies C) managers in organizations D) managerial accountants 3) ________ is the field of accounting that develops information for.
4 Views
View Answer
1.3   Questions 1) A budget ________. A) is a quantitative expression of a plan of action B) provides feedback by comparing actual results with planned results C) includes deviations from planned results D) ignores areas that are presumed to be running smoothly 2) Performance reports ________. A) are quantitative expressions of plans for action B) provide feedback by.
2 Views
View Answer
1.5   Questions 1) Which credential is associated with independent auditors? A) CMA B) CPA C) CFP D) IMA 2) The largest U.S. association of professional accountants whose major interest is management accounting is the ________. A) American Institute of Certified Public Accountants B) American Institute of Certified Management Accountants C) Institute of Management Accountants D) American Institute of Management Accountants 3).
0 Views
View Answer
Multiple Choice 1) ________ are useful when a team needs to meet on some topic, but not everyone can meet at the same time. A) Blogs B) Discussion forums C) Wikis D) Surveys 2) Synchronous communication is defined as ________. A) communication between people and groups in the same time zone B) communication between people working in the.
14 Views
View Answer
1.6   Questions 1) Which of the following is a major factor causing changes in management accounting today? A) decreased global competition B) advances in technology C) shift to manufacturing-based economy D) expansion of the value chain 2) Which is NOT a service organization? A) Rainbow Dry Cleaners B) Law Firm of Cannon and Dunfy C) Shoreeast Real Estate Company D).
0 Views
View Answer
11) A fraternity held a party.  The fraternity prepared the following budget for 25 expected attendees: Room rental$150 Food250 Entertainment150 Decorations75 Total Costs$625 Twenty-five people attended the party.  The following costs were incurred: Room rental$140 Food320 Entertainment125 Decorations175 Total Costs$760 What is the primary reason for the unfavorable variance for total costs? A) room rental B) food C) entertainment D) decorations 12) A sorority held a party. .
1 Views
View Answer
21) A criticism of biometric authentication is that it provides weak authentication. 22) With asymmetric encryption, two different keys are used for encoding and decoding a message. 23) The most secure communications over the Internet use a protocol called HTTP. 24) Packet-filtering firewalls sit outside an organizational network. 25) Packet-filtering firewalls examine each part.
0 Views
View Answer
1.4   Questions 1) Marketing is the function of the value chain that involves ________. A) the mechanism by which a company delivers products or services to the customer B) the manner by which individuals or groups learn about the value and features of products or services C) selling activities and delivery activities D) selling activities.
2 Views
View Answer
21) The purpose of the ________ phase of project management is to ensure that tasks are accomplished on time. A) finalizing B) starting C) doing D) planning 22) Rochelle, a senior program analyst in Levy, Inc., reschedules various tasks assigned to her subordinates in order to meet a project's new guidelines. In this case, Rochelle.
10 Views
View Answer
21) Most scorecard and attention-directing information is produced on a nonroutine basis. 22) Reports prepared by managerial accountants have a past orientation. 23) A manager using information to decide whether to add or drop a product is an example of problem solving. 24) The same information may serve the attention-directing function and the.
2 Views
View Answer
41) The enforcement of security procedures and policies consists of three interdependent factors: ________. A) centralized reporting, preparation, and practice B) account administration, systems procedures, and security monitoring C) separation of duties, provision of least privilege, and position sensitivity D) responsibility, accountability, and compliance 42) In terms of password management, when an account is created,.
1 Views
View Answer
1) A cooperative result is usually better in quality than the result of someone working alone. 2) Multiple versions of a document are created when a group of people collaborate. 3) An extremely critical group cannot collaborate effectively. 4) It is essential for team members to express any differences in perceptions of.
0 Views
View Answer
31) With HTTPS, data are encrypted using the Secure Socket Layer (SSL) protocol, which is also known as ________. A) File Transfer Protocol (FTP) B) Simple Mail Transfer Protocol (SMTP) C) Secure Shell (SSH) D) Transport Layer Security (TLS) 32) A(n) ________ sits outside an organizational network and is the first device that Internet traffic.
0 Views
View Answer
11) Why is information considered the most fundamental collaboration purpose? A) Individuals can construct different perceptions of the same data. B) All the members of a team usually conceive information in the same way. C) Disclosing information may lead to unsuccessful collaboration. D) Being informed restricts communication between members of a group. 12) ________ decisions.
2 Views
View Answer
21) Backup and physical security are ________ against computer security threats. A) technical safeguards B) data safeguards C) human safeguards D) procedural safeguards 22) A user name ________ a user. A) authenticates B) identifies C) conceals D) encrypts 23) A password ________ a user. A) authenticates B) identifies C) conceals D) encrypts 24) Users of smart cards are required to enter a ________ to be.
0 Views
View Answer
1.2   Questions 1) Which of the following items should be considered by managers when designing accounting systems? A) cost-benefit balances B) behavioral implications C) cost-benefit balances and behavioral implications D) none of the above 2) ________ is (are) the primary consideration in choosing among accounting systems and methods. A) Simplicity B) Behavioral implications C) The cost-benefit balance D) Simplicity and.
2 Views
View Answer
Multiple Choice 1) A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset. A) Hadoop B) safeguard C) information silo D) third-party cookie 2) Which of the following types of security loss is WikiLeaks an example of? A) unauthorized data disclosure B) incorrect data modification C) faulty service D) denial of service 3).
2 Views
View Answer