Info
Warning
Danger

Study Resources (Accounting)

11) What does the accounting interface connect the user to? A) Database management system B) Database query C) Database D) Database reports 12) Virtually all accounting software uses databases to A) Store accounting data B) View database forms C) Navigate the accounting system D) Run database queries 13) Which of the following is NOT a component of the.
7 Views
View Answer
61) A(n) ________ is a formal description of a system's response to use and misuse scenarios. A) test plan B) as-is model C) digital certificate D) code injection 62) The term system conversion refers to the phase in which an organization ________. A) designs the software for a new system B) installs a new system C) tests a.
6 Views
View Answer
Objective 2 1) Database forms allow a user to record accounting transactions that are the result of various business processes. 2) Data validation tools ensure data is entered multiple times. 3) Database forms do not need security to limit data access or data entry. 4) Database forms are often designed to automatically complete portions.
7 Views
View Answer
71) As a source of security vulnerabilities, malicious human activity includes ________. A) poorly designed procedures B) intentional destruction of data C) physical accidents D) poorly written applications 72) ________ refers to social engineering in which someone deceives by pretending to be someone else. A) Pretexting B) Spyware C) Sniffing D) Denial-of-service 73) ________ is a social engineering technique in.
6 Views
View Answer
42) When designing accounting database tables, how can we ensure the database will support the data needed by the enterprise? How can this information be collected? 43) What is the purpose of a foreign key? Provide an example. 44) Describe the types of relationships possible between tables in a relational database. Indicate.
6 Views
View Answer
21) To obtain a deep understanding of the underlying business of an enterprise system servers, you need to ask key questions. What are those questions? 22) How does an enterprise system support people in the same company to perform different but related business activities? Please provide an example. 23) You are an.
9 Views
View Answer
21) An intersection table's primary key is a(n) ________. 22) Generally, the relationship between a table that stores customer data and table that stores sales order data is ________. 23) Generally, the relationship between a table that stores sales order data and a table that stores inventory data is ________. 24) Database fields.
4 Views
View Answer
Objective 4 1) Database anomalies are limited to databases using a network structure. 2) Intersection tables do not remove duplicate records from tables that have a many-to-many relationships. 3) To maintain primary key integrity, a relational database designer will not allow a primary key to have a null (empty) value. 4) Referential integrity ensures.
7 Views
View Answer
11) Queries may be used with ________ to update data in the database. A) navigation B) forms C) reports D) tables 12) Queries are questions you ask about A) Information in a report B) Data provided in the search results C) Data stored in a database D) None of the above 13) For relational databases, queries are usually written.
5 Views
View Answer
116) Differentiate between symmetric encryption and asymmetric encryption. 117) Briefly describe a virus, a Trojan horse, and a worm. 118) Explain the importance of position definitions in information security. 119) Differentiate between a hot site and a cold site. .
8 Views
View Answer
106) What is the difference between pilot installation and phased installation? 107) What is the difference between parallel installation and plunge installation? 108) Discuss the approach of designing business processes before building information systems. 109) What are the major sources of security vulnerabilities? 110) What is meant by pretexting and phishing? .
5 Views
View Answer
Objective 1 1) Accounting systems usually use a GUI to increase the ease of entering and retrieving accounting data. 2) The accounting interface connects the accountant user to the database behind the screen. 3) The user interface does not need to provide way for the user to query the database. 4) Software interfaces today.
15 Views
View Answer
Objective 3 1) The Vendors Module of a baseline accounting system relates to the sales cycle. 2) The Customer Module of a baseline accounting system includes creating purchase orders. 3) The Banking Module of a baseline accounting system includes bill paying transactions. 4) Accounting software often includes a navigation screen that represents the major.
7 Views
View Answer
101) What is BPM? What are the basic activities in BPM? 102) Briefly explain the modeling activity of BPM. 103) List the activities in the SDLC process. 104) Briefly describe the requirements determination stage of the SDLC process. 105) Briefly describe the tasks in the implementation activity of the SDLC process. .
5 Views
View Answer
51) During the ________ activity of BPM, managers evaluate process measures against their objectives and respond to changes in the business climate. A) component creation B) monitoring C) modeling D) process implementation 52) During the modeling activity of BPM, teams build an as-is model which ________. A) simulates the ideal situation B) designs new business processes C) documents.
5 Views
View Answer
11) A test plan is an informal description of how an information system's components should be tested. 12) The term system conversion refers to the process of testing software. 13) With pilot installation, an organization implements a limited portion of a new business process on the entire organization. 14) With parallel installation, a.
13 Views
View Answer
41) A bot is a computer program that is surreptitiously installed and takes actions unknown and uncontrolled by the computer's owner or administrator. 42) The practice of keeping a copy of an encryption key with a trusted party is referred to as key escrow. 43) Documenting position sensitivity enables security personnel to.
6 Views
View Answer
21) IP spoofing is a situation in which a computer registers on a network without using an IP address. 22) Sniffing is a technique for intercepting computer communications. 23) Hacking occurs when a person gains unauthorized access to a computer system. 24) Denial-of-service attacks involve the sending of anonymous e-mails to users. 25) Natural.
9 Views
View Answer
91) A ________ is a computing device or a program that prevents unauthorized network access. A) firewall B) payload C) bot D) hot site 92) A virus is a computer program that ________. A) observes the user's actions and keystrokes B) replicates itself C) encrypts data D) prevents unauthorized network access 93) ________ are viruses that masquerade as useful programs.
5 Views
View Answer
17) Why are financial reports provided to external users? Please provide an example. 18) What is the objective of tax returns? Do the same rules for financially statements apply to the tax returns? 19) How can a database report be interactive? 20) Database programs provide tools for building database reports. List four tools. .
7 Views
View Answer
11) Business Intelligence tools use queries to extract data directly from the relational database, bypassing the OLAP cube and any accompanying delay. 12) Data cubes allow you to view data in two dimensions. 13) Structured Query Language is used to query a relational database. Match the following cycles with their corresponding accounting system.
8 Views
View Answer
Objective 3 1) Database fields are pieces of information about event, people, and objects. 2) To retrieve data stored in a relational database, each record must have one or more unique identifier. 3) What IT professionals call people or things, accounting professionals call objects. 4) A database table that stores data about items a.
3 Views
View Answer
Objective 1 1) An IT auditor must understand the terms and definitions used by accounting and IT professionals. 2) Which of the following are NOT part of the basic functions of an enterprise system? A) Hiring B) Output C) Input D) Processing Objective 2 1) A Supply Chain Management (SCM) system is a subsystem of an Accounting System. 2).
18 Views
View Answer
Objective 4 1) Queries may be used with database forms to update data in the database. 2) Query builder tools make it possible to build queries using programming code. 3) Query builder tools may be referred to as query-by-example. 4) The ability to understand SQL programming may be needed to successfully conduct an IT.
6 Views
View Answer
Objective 2 1) Data stored in a data warehouse is used for routine business activities. 2) The ________ is responsible for managing the enterprise's databases. 3) Data stored in a ________ may be current data, historical data, or future estimates. 4) In a ________ database structure, a parent record can have many child records.
5 Views
View Answer
21) Which transactions are usually performed in the Customers module of the Baseline Accounting System? A) Receive inventory B) Create invoice C) Create purchase order D) Pay bills 22) The sales cycle corresponds to which module in the Baseline Accounting System? A) Banking B) Vendors C) Customers D) Employees 23) Which event is part of the Purchasing Cycle? A) Pay bill B).
7 Views
View Answer
Match the database table to the appropriate transaction cycle. A) Banking Cycle B) Sales Cycle C) Purchasing Cycle D) Financial Cycle E) Payroll Cycle 11) General Ledger 12) Account Transactions 13) Time Worked 14) Employee 15) Purchase Order 16) Cash Receipts 17) Customer 18) Database ________ store pieces of information about people, events, and objects. 19) Database ________ are used to search the database.
5 Views
View Answer
11) Which report is an internal management report? A) Contribution Margin Income Statement B) Balance sheet C) State income tax report D) Statement of Cash Flows 12) Which reports are external reports given to outside parties? A) Financial accounting reports and management reports B) Tax reports and management reports C) Regulatory reports and tax reports D) Management reports and.
7 Views
View Answer
Objective 4 1) Processes are related activities or events that create value. 2) An IT audit includes auditing the System Development Life Cycle (SDLC). 3) What are the three key factors to consider for a successful accounting system? A) People, budget, and time B) Time, processes, and technology C) People, processes, and technology D) Processes, budget, and.
7 Views
View Answer
Use the database table below to answer the following questions. 14) You are an accountant at a small company and you are reviewing the vendor database table. Identify the database anomalies shown and explain how they impact this database. 15) What suggestions would you give the database designer? How should the database.
9 Views
View Answer
Objective 3 1) Sustainability reports are increasingly demanded by managers to evaluate an enterprise's responsiveness to economic, environmental, and social sustainability challenges. 2) The difference between Real-time reports and Live reports is that Real-time reports continuously provide up-to-the minute data. 3) Information broadcasting can be used to email electronic reports to end users.
7 Views
View Answer
31) Which of the relationships below is a many-to-many relationship? A) CUSTOMERS, SALES ORDERS B) SALES ORDERS, ITEMS C) ITEMS, SO LINE D) SO LINE, CUSTOMERS 32) The ________ table is an intersection table. A) CUSTOMERS B) SALES ORDERS C) ITEMS D) SO LINE 33) By using an intersection table, which field can be removed from the SALES ORDERS table? A).
5 Views
View Answer
50) What is the difference between the aerial view and zoom view of an accounting system? 51) Identify the six modules in the baseline accounting system. Which transaction cycle is associated with each module? What type of transactions are associated with each module? 52) If you were the person entering transactions into.
6 Views
View Answer
31) Which accounting software is designed for a large-scale company? A) Oracle's PeopleSoft Enterprise B) SAP Business All-In-One C) Oracle's JD Edwards EnterpriseOne D) SAP Business One 32) When designing a database, which field would NOT belong in a table storing customer information? A) First Name B) Order Number C) Zip Code D) Street Address 33) When designing a database,.
5 Views
View Answer
31) Biometric authentication uses personal physical characteristics to authenticate users. 32) A key is a number used to encrypt data. 33) Two different keys are used for coding and decoding in symmetric encryption. 34) A public key is used for decoding messages in asymmetric encryption. 35) Most secure communication over the Internet uses a.
8 Views
View Answer
81) Which of the following is NOT an element of computer security? A) System owners should not have computer security responsibilities outside their own organizations. B) Computer security responsibilities and accountability should be made explicit. C) Computer security is constrained by societal factors. D) Computer security should be periodically reassessed. 82) Which of the following.
6 Views
View Answer
22) The accounting system's front-end user interface is serviced by which three database essentials? What service does each database essential perform? 23) You are an accountant at a medium-sized company, your boss asks you to evaluate the interface of an accounting she is thinking about purchasing. What interface characteristics do you.
5 Views
View Answer
111) What is spoofing? What are the two types of spoofing? 112) What is hacking? 113) In the context of information systems, what is meant by safeguards? 114) Briefly describe management's role in information systems security. 115) What is biometric authentication? What are its advantages and disadvantages? .
10 Views
View Answer