Info
Warning
Danger

Study Resources (Accounting)

TRUE/FALSE 1.An entity in an accounting system can be classified as a resource, event or agent about which data are collected. 2.Attributes are often called fields. 3.A model is a complex representation of a simple entity or phenomenon. 4.A primary attribute is the attribute whose value is unique for every entity that will appear.
18 Views
View Answer
11.Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes. a.control activities b.event identification c.risk assessment d.risk response 12.This component of the ERM framework encompasses the tone.
5 Views
View Answer
41.Establishing a viable internal control system is primarily the responsibility of: a.the external auditors b.management c.programmers d.government authorities 42.As a result of an inadequate design, a production process yields an abnormally high amount of raw material scrapped. Which control goal is being violated? a.ensure effectiveness of operations b.ensure efficient employment of resources c.ensure security of resources d.ensure input.
6 Views
View Answer
31.An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of: a.authorizing events b.executing events c.recording events d.safeguarding resources 32.A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it authorizing the removal of the.
4 Views
View Answer
PROBLEMS 1.The following table is a view of BILLING_HOURS from the various data elements in ABC's relational database: BILLING_HOURS Employee_No Client_No Date Hours Billing_Rate B122 F11555 990823 8 150 A632 F11555 990823 8 100 B122 F11555 990824 8 150 A632 F11555 990824 8 100 B122 F11555 990825 8 150 A632 F11555 990825 8 100 B122 H12456 990826 8 150 A632 H12456 990826 8 100 A356 F11555 990826 8 57 A432 H12456 990826 8 57 A491 H12456 990826 8 57 B122 F11555 990827 8 150 A632 H12456 990827 8 100 A356 F11555 990827 8 57 B432 H12456 990827 8 57 B491 H12456 990827 8 57 Required: a. Using proper SQL commands, develop a query to extract billing data for Fleet Services (client number F11555), showing the employee number, date, hours, and billing rate. b. Design a table showing the output that would be.
6 Views
View Answer
21.              ______________________________ is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. 22.              _________________________ refers to the exploration, aggregation, and analysis of large quantities of varied data from across the organization. 23.              ____________________ is the most popular data modeling approach. 24.              In developing.
5 Views
View Answer
MULTIPLE CHOICE 1.A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is a.enterprise risk management b.internal control c.organizational governance d.risk assessment 2.A process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect.
5 Views
View Answer
31.An invalid item is an object or event that is not authorized, never occurred, or is otherwise not genuine. 32.The control goal of input accuracy is concerned with the correctness of the transaction data that are entered into a system. 33.Business process control plans relate to those controls particular to a specific.
3 Views
View Answer
31.Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate or resume operations with a minimum of disruption. 32.Continuity is the process of using backup measures to restore lost data and resume operations. 33.With continuous data protection.
5 Views
View Answer
41.A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a: a.segregation of duties b.fidelity bond c.personnel planning control d.termination control plan 42.Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan? a.rotation of.
7 Views
View Answer
MULTIPLE CHOICE 1.An entity can be classified as all of the following except a.resource b.event c.tuple d.agent 2.A(n) ____ of an entity is on specific thing of the type defined by the entity. a.agent b.composite attribute c.attribute d.instance 3.A(n) ____ is an item of data that characterizes an entity or relationship a.agent b.composite attribute c.attribute d.instance 4.Which of the following is the entity or agent? a.client b.client number c.client.
16 Views
View Answer
21.According to the 2008 Report to the Nation on Occupational Fraud and Abuse, frauds are more likely to be detected by audits or internal controls than through tips. 22.A computer crime technique called worm involves the systematic theft of very small amounts from a number of bank or other financial accounts. 23.A.
7 Views
View Answer
41.Periodic cleaning, testing, and adjusting of computer equipment is referred to as ______________________________. 42.______________________________ is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls. 43.Copies of important stored data, programs, and documentation made periodically are called ____________________. 44.The process whereby lost data is restored and.
9 Views
View Answer
MULTIPLE CHOICE 1.The use of IT resources for enterprise systems and e-business a.magnifies the importance of protecting the resources both within and outside of the organization from risks b.magnifies the importance of protecting the resources both within but not outside the of the organization from risks c.makes it easier to provide internal control risk.
5 Views
View Answer
11.Risks are those events that could have a negative impact on organization objectives. 12.Opportunities are events that could have a positive impact on organization objectives. 13.Risk assessment is the entity's identification and analysis of relevant risks to achievement of its objectives, forming a basis for determining how the risks should be managed. 14.The.
12 Views
View Answer
PROBLEMS 1.List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples. List 1 - Coding Schemes A. Sequential (serial) B. Block C. Significant digit D. Hierarchical E. Mnemonic F. Check digit G. Color List 2 - Coding Examples 1. Sue Smith is taking three college courses this semester--AC 340, FI 101, and EN 280. When you check with the Registrar's.
6 Views
View Answer
41.              A(n) ___________________________________ is the attribute whose value is unique for every entity that will appear in the database. 42.              _________________________ is a measure of the highest level of participation that one entity can have in another entity. 43.              In set theory, a two-dimensional collection of information is called a(n) ____________________. 44.              ____________________.
7 Views
View Answer
21.A missing value is called a non-null. 22.The secondary key is specified to uniquely identity each tuple in the relation. 23.SQL is a powerful database language that can be used to define database systems, query the database for information, generate reports from the database, and access databases from within programs using embedded.
6 Views
View Answer
21.A set of data that describes an instance of the entity represented by a relation is known as a(n) ____. a.tuple b.resource c.agent d.event 22.Legacy systems do not usually have which of the following characteristics? a.developed on previous hardware (and/or software) platforms b.are easily adaptable to enterprise systems c.have been used by an organization for a long period.
8 Views
View Answer
PROBLEM 1.Below is an alphabetical list of sources with information and guidance on internal controls. The second list contains descriptions or information provided by these sources. Required: On the blank line to the left of each numbered item, place the capital letter of the source that best matches that description. HINT: Some letters.
7 Views
View Answer
31.A computer abuse technique called a ____________________ involves a program that replicates itself on disks, in memory, and across networks. 32.A computer abuse technique called a(n) _________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the.
6 Views
View Answer
11.____ can consist of many computers and related equipment connected together via a network. a.PCs b.Servers c.LAN d.Firewall 12.In an information systems organization, which of the following reporting relationships makes the least sense? a.the data center manager reports to the CIO. b.the systems development manager reports to the data center manager. c.database administration reports to the technical services.
4 Views
View Answer
COMPLETION 1.A(n) ____________________ in an accounting system can be classified as a resource, event, or agent about which data is collected. 2.A(n) ____________________ is an item of data that characterizes an entity or relationship. 3.Attributes that consist of multiple subattributes are referred to as _________________________. 4.A(n) _________________________ is the attribute whose value is unique.
9 Views
View Answer
31.____ are the policies and procedures that help ensure that management directives are carried out. a.Control environment b.Risk assessment c.Control activities d.Monitoring 32.____ is a process that assesses the quality of internal control performance over time. a.Control environment b.Risk assessment c.Control activities d.Monitoring 33.Which of the following statements regarding internal controls systems is false? a.Effective internal control systems provide complete.
9 Views
View Answer
41.A(n) ____________________ item is an object or event that is not authorized, never occurred, or is otherwise not genuine. 42.The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure _________________________. 43.A missing data field on a source document or computer.
7 Views
View Answer
11.A recursive relationship is created when there is an employee being supervised, and another employee is the supervisor. 12.The cardinality constraint is used less frequently than the participation constraint. 13.The cardinality constraint is used to specify both the minimum and maximum participation of one entity in the relationship with the other entity. 14.The.
10 Views
View Answer
21.The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions? a.data control b.data entry c.data librarian d.database administration 22.The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions? a.data control b.data preparation (data entry) c.data librarian d.computer.
5 Views
View Answer
TRUE/FALSE 1.IT governance leads to better organizational performance such as profitability. 2.As an IT resource, information includes data in all their forms that are input, processed and output by information systems. 3.As an IT resource, applications are automated systems and manual procedures that process information. 4.The system of controls used in this text consists.
18 Views
View Answer
31.Which of the following relational commands would a manager use to combine the data from two related relations into a third relation? a.select b.project c.join d.display 32.In a relational database, the entity is represented as a(n): a.table b.network c.field d.attribute 33.Which is not a step in creating a relation using SQL? a.assign the relation a name b.assign each attribute a name c.specify the.
7 Views
View Answer
11.___________ values waste memory space and may cause problems when running queries. 12.A collection of data representing multiple occurrences of a resource, event, or agent is known as a(n) ____________________. 13.A set of data that describes a single instance of the entity represented by a relation is known as a(n) ____________________. 14.The _________________________.
7 Views
View Answer
11.Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction. 12.The IS function of systems development provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes and disks,.
11 Views
View Answer
3.Based on the following abbreviated description of Avery University's course scheduling and student advising procedures, prepare an Entity-Relationship (E-R) diagram that reflects the key entities and relationships. Course Scheduling: In consultation with the vice-president of Academic Affairs and the Registrar's Office, each academic department chair decides which courses will be offered each.
8 Views
View Answer
COMPLETION 1.________________________________________ is a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may effect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of .
8 Views
View Answer
4.Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding. Required: For each fraud example, enter a letter corresponding to which information control goal was initially violated--Validity, Completeness, or Accuracy. Some examples might involve more than one violation. NOTE:.
9 Views
View Answer
51.  Why is there usually no control goal called update validity? a.Update completeness achieves update validity. b.Input validity guarantees update validity. c.Update accuracy guarantees update validity. d.Input accuracy achieves update validity. 52.A programming error causes the sale of an inventory item to be added to the quantity on hand attribute in the inventory master data..
6 Views
View Answer
31.___________________________________ is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party. 32.With the data replication strategy known as ________________________________________ all data changes are data stamped and saved to secondary systems as the changes are happening. 33.The disaster.
5 Views
View Answer
21.______________________________ is the entity's identification and analysis of relevant risks to achievement of its objectives, forming a basis for determining how the risks should be managed. 22.The _________________________ sets the tone of the organization, influencing the control consciousness of its people. 23.______________________________ are the policies and procedures that help ensure that management.
9 Views
View Answer
COMPLETION 1.______________________________ is a process that ensures that the enterprises’s IT sustains and extends the organization’s strategies and objectives. 2.Data in all their forms that are input, processed, and output by information systems is the IT resource ____________________. 3.IT resource that are automated systems and manual procedures that process information _________________________. 4. ______________________________ are.
9 Views
View Answer
51.Control plans that relate to a multitude of goals and processes are called ________________________________________. 52.A control plan requires that a manager sign his/her approval of timecards for employees in that department. This control plan is an example of a ________________________________________. 53.A batch of business events is accurately entered into a business event.
5 Views
View Answer
TRUE/FALSE 1.Organizational governance is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. 2.Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals). 3.Management is responsible for establishing and maintaining an adequate system of internal control 4.A.
11 Views
View Answer
11.The section of Sarbanes Oxley that requires a company’s CEO and CFO to certify quarterly and annual reports is _____________________________________________. 12.The section of Sarbanes Oxley that requires each annual report filed with the SEC to include an internal control report is _____________________________________________. 13.The section of Sarbanes Oxley that requires financial analysts to.
8 Views
View Answer
11.The information systems function ______________________________ provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation. 12.The ______________________________ maintains custody of and controls access to programs, files, and documentation. 13.Combining the functions of authorizing and executing events is a violation.
5 Views
View Answer
11.              Because it uses alphabetic characters, a(n) ____________________ coding system makes it easier for human beings to remember the codes. 12.              A(n) ______________________________ is a code that includes an extra digit that can be used to check the accuracy of the code. 13.              The ____________________ approach to data management concentrates on the.
8 Views
View Answer
31.              In a(n) ____________________ database model, a child record may have more than one parent. 32.              In a(n) ____________________ database model, data are logically organized into two-dimensional tables. 33.              A(n) _______________________________database model allows both simple and complex objects, including video clips and pictures, to be stored. 34.              The goal of ____________________ is to.
4 Views
View Answer
21.A(n) ______________________________ indemnifies a company in case it suffers losses from defalcations committed by its employees. 22.The ______________________________ covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification. 23.Computer software that is used to facilitate the execution of a given business process.
6 Views
View Answer
3.Transform the relation in Figure TB 5.3 to second normal form (2NF). Label each new relation with a name that describes the attributes. 4.Transform the relation in Figure TB 5.5 to third normal form (3NF). Label each new relation with a name that describes the attributes. 5.Given the following: List 1 - Terms A. data.
8 Views
View Answer
41.Access control software ensures that only authorized users gain access to a system through a process  of identification and authentication. 42.Threat monitoring is a technique to protect one network from another “untrusted” network. 43.Application controls restrict access to data, programs, and documentation. 44.An intrusion-detection systems (IDS) logs and monitors who is on or.
3 Views
View Answer
11.The mapping of the relationships between entities would be used in the development of a(n): a.context diagram b.logical DFD c.physical DFD d.REA Model 12.The sequence of steps in identifying relationships in a model is: a.evaluate entities as pairs, identify user existing and desired information, evaluate each entity to determine if there is any need for two.
5 Views
View Answer
21.Forced vacations is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place. 22.A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees. 23.According to COSO, most organizations are adequately monitoring operations. 24.Data encryption is.
7 Views
View Answer
21.The section of Sarbanes Oxley that prohibits a CPA firm that audits a public company from engaging in certain non-audit services with the same client is: a.Title I – Public Company Accounting Oversight Board b.Title II – Auditor Independence c.Title III – Corporate Responsibility d.Title IV – Enhanced Financial Disclosures 22.The section of Sarbanes Oxley.
6 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

Let us boost your grade together!