Info
Warning
Danger

Study Resources (Accounting)

MULTIPLE CHOICE APPENDIX QUESTION 1.The primary difference between a LAN and a WAN is a.the geographical area covered by the network b.the transmission technology used c.the type of workstation used d.the size of the company 2.To physically connect a workstation to a LAN requires a a.file server b.network interface card c.multiplexer d.bridge 3.One advantage of network technology is a.bridges and gateways connect one.
4 Views
View Answer
11.A star topology is appropriate a.for a wide area network with a mainframe for a central computer b.for centralized databases only c.for environments where network nodes routinely communicate with each other d.when the central database does not have to be concurrent with the nodes 12.In a ring topology a.the network consists of a central computer which.
5 Views
View Answer
11.In the object-oriented approach to systems design, when an operation is performed on an object, an attribute will always be changed. 12.In the object-oriented approach to systems design, inheritance means that each object instance inherits the attributes and operations of the class to which it belongs. 13.In the object-oriented approach to systems.
10 Views
View Answer
6.The PCAOB’s standard No. 2 specifically requires auditors to understand transaction flows in designing their test of controls. What steps does this entail? 1. Selecting the financial accounts that have material implications for financial reporting. 2. Identify the application controls related to those accounts. As previously noted, the 3. Identify the.
9 Views
View Answer
SHORT ANSWER 1.Why is it important that the systems professionals who design a project not perform the detailed feasibility study of the project? 2.List at least three one-time costs and three recurring costs in system development. 3.____________________ benefits can be measured and expressed in financial terms, while ____________________ benefits cannot be easily measured.
5 Views
View Answer
21.The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called a.technical feasibility b.operational feasibility c.schedule feasibility d.legal feasibility 22.The ability of a system to protect individual privacy and confidentiality is an example of a.schedule feasibility b.operational feasibility c.legal feasibility d.economic feasibility 23.The systems project proposal a.provides management with a basis.
5 Views
View Answer
11.The most frequent victims of program viruses are microcomputers. 12.Access controls protect databases against destruction, loss or misuse through unauthorized access. 13.Operating system integrity is not of concern to accountants because only hardware risks are involved. 14.Audit trails in computerized systems are comprised of two types of audit logs: detailed logs of individual.
11 Views
View Answer
16.Which control will not reduce the likelihood of data loss due to a line error? a.echo check b.encryption c.vertical parity bit d.horizontal parity bit 17.Which method will render useless data captured by unauthorized receivers? a.echo check b.parity bit c.public key encryption d.message sequencing 18.Which method is most likely to detect unauthorized access to the system? a.message transaction log b.data encryption standard c.vertical parity.
6 Views
View Answer
21.The fundamental difference between internal and external auditing is that a.internal auditors represent the interests of management and external auditors represent outsiders b.internal auditors perform IT audits and external auditors perform financial statement audits c.internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits d.external auditors.
5 Views
View Answer
11.Which statement is not correct? The structured design approach a.is a top-down approach b.is documented by data flow diagrams and structure diagrams c.assembles reusable modules rather than creating systems from scratch d.starts with an abstract description of the system and redefines it to produce a more detailed description of the system 12.The benefits of the.
8 Views
View Answer
SHORT ANSWER 1.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe a disadvantage associated with this procedure. 2.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe an advantage associated with this procedure. 3.What is prototyping? Why is.
12 Views
View Answer
12.What is a mirrored data center? 13.Why is supervisory control more elaborate in the CBIS environment than in the manual environment? 14.What are some control implications of the distributed data processing model? 15.What is program fraud? 16.The distributed data processing approach carries some control implications of which accountants should be aware. Discuss two. 17.__________________________ are.
6 Views
View Answer
18.Explain the relationship between internal controls and substantive testing. 19.Discuss the interrelationship of tests of controls, audit objectives, exposures, and existing controls. 20.Distinguish between errors and irregularities. Which do you think concern the auditors the most? 21.Describe two tests that an auditor would perform to ensure that the disaster recovery plan is adequate. 22.Distinguish.
10 Views
View Answer
11.A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster. 12.IT auditing is a small part of most external and internal audits. 13.Assurance services is an emerging field that goes beyond the auditor’s traditional attestation function. 14.An IT auditor expresses an opinion on the fairness of.
10 Views
View Answer
11.Part of systems planning is a project feasibility study. Several feasibility issues can be raised. What are they? Explain the key concerns. 12.Explain the role of accountants in the conceptual design stage. 13.Classify each of the following as either a one-time or recurring costs: 14.What is competency analysis and why do managers do.
11 Views
View Answer
31.All of the following tests of controls will provide evidence about the adequacy of the disaster recovery plan except a.inspection of the second site backup b.analysis of the fire detection system at the primary site c.review of the critical applications list d.composition of the disaster recovery team 32.Which of the following is true? a.In the CBIS.
7 Views
View Answer
TRUE/FALSE 1.Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting. 2.Both the SEC and the PCAOB requires management to use the COBIT framework for assessing internal control adequacy. 3.Both the SEC and the PCAOB requires management to use the COSO framework for assessing internal control.
19 Views
View Answer
APPENDIX QUESTION 14.When are networks connected with a bridge and with a gateway? 15.Describe an advantage to the client/server topology. 16.Describe one primary advantage of polling as a network control method. 17.Describe one disadvantage to carrier sensing as a network control method. 18.Why is network control needed? What tasks are performed? 19.Define WAN, LAN, and VAN. 20.What.
5 Views
View Answer
MULTIPLE CHOICE 1.Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act? a.Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting. b.Auditors must interview management regarding significant changes in the design or operation of internal control that.
11 Views
View Answer
11.Instead of implementing an application in a single “big-bang” release, modern systems are delivered in parts continuously and quickly 12.When the nature of the project and the needs of the user permit, most organizations will seek a pre-coded commercial software package rather than develop a systems in-house. 13.All of the steps in.
8 Views
View Answer
11.Auditors examine the physical environment of the computer center as part of their audit. Many characteristics of computer centers are of interest to auditors. What are they? Discuss. 12.Explain why certain duties that are deemed incompatible in a manual system may be combined in a CBIS environment? Give an example. 13.Compare and.
10 Views
View Answer
21.Electronic data interchange customers may be given access to the vendor's data files. 22.The audit trail for electronic data interchange transactions is stored on magnetic media. 23.A firewall is a hardware partition designed to protect networks from power surges. 24.To preserve audit trails in a CBIS environment, transaction logs are permanent records of.
11 Views
View Answer
ESSAY 1.Discuss the key features of Section 404 of the Sarbanes-Oxley Act 2.Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Discuss the options in selecting a control framework. 3.Explain how general controls impact transaction integrity and the financial reporting process. 4.Prior to.
6 Views
View Answer
21.The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is a a.fully documented system report b.systems selection report c.detailed system design report d.systems analysis report 22.The detailed design report contains all of the following except a.input screen formats b.alternative conceptual designs c.report layouts d.process logic 23.When each element of information supports the user’s decision or.
7 Views
View Answer
21.Correctly designed, processing modules are tightly coupled and have strong cohesion. 22.A system walkthrough occurs after the system is implemented. 23.The detailed design report is the “blueprint” which guides programmers and database administrators in constructing the physical system. 24.When a program module is tested, both good and bad data are included with the.
8 Views
View Answer
ESSAY APPENDIX QUESTION 1.Contrast a LAN and a WAN. Typically, who owns and maintains a WAN? 2.Describe the basic differences between the star, ring, and bus topologies. 3.What security questions must be considered with regard to Internet commerce? 4.What is the World Wide Web? 5.Discuss the three levels of Internet business models. .
4 Views
View Answer
10.List two ways that a systems project can contribute to the strategic objectives of the firm. 11.List four types of facts that should be gathered during an analysis of a system. 12.What is the Internal Business Process Perspective? 13.What is the Learning and Growth Perspective? 14.When a company is doing financially well, why is.
6 Views
View Answer
5.Contrast the feasibility study performed in the systems analysis phase of the Systems Development Life Cycle (SDLC) with the study performed in the systems selection phase of the SDLC. 6.Explain why the Systems Development Life Cycle is of interest to accountants. What is the accountant’s role in the Systems Development Life.
8 Views
View Answer
23.Contrast internal and external auditing. 24.What are the components of audit risk? 25.How do the tests of controls affect substantive tests? 26.What is an auditor looking for when testing computer center controls? 27.Define and contrast attestation services and assurance services. .
7 Views
View Answer
ESSAY 1.Describe at least four advantages and two disadvantages of the Computer Aided Software Engineering (CASE) approach. 2.CASE tools develop systems without the intermediate step of writing human readable source code. This can pose some concerns for accountants. What are they? 3.Discuss the appropriate steps to take when selecting a commercial software package. 4.The.
8 Views
View Answer
8.What is the purpose of the Request for Proposal (RFP)? 9.Explain how a benchmark problem is used to measure the performance of two different commercial software packages. 10.Contrast the structured and object-oriented approaches to conceptual systems design. Which is more common? 11.List three characteristics that should be considered when designing a hardcopy input.
12 Views
View Answer
31.Which statement is not true? A systems design walkthrough a.is conducted by a quality assurance group b.occurs just after system implementation c.simulates the operation of the system in order to uncover errors and omissions d.reduces costs by reducing the amount of reprogramming 32.System documentation is designed for all of the following groups except a.systems designers and.
9 Views
View Answer
11.A tangible benefit a.can be measured and expressed in financial terms b.might increase revenues c.might decrease costs d.all of the above 12.Intangible benefits a.are easily measured b.are of relatively little importance in making information system decisions c.are sometimes estimated using customer satisfaction surveys d.when measured, do not lend themselves to manipulation 13.Which technique is least likely to be used to.
7 Views
View Answer
TRUE/FALSE 1.The detailed design phase of the Systems Development Life Cycle is a linear process with each of five steps occurring once and in its proper sequence. 2.In a Computer Aided Software Engineering (CASE) environment, the most important use of a data flow diagram is to present a graphic display of the.
23 Views
View Answer
ESSAY 1.Explain the five stages of the systems development life cycle? 2.What is the balanced scorecard? 3.Define the feasibility measures that should be considered during project analysis and give an example of each. 4.Explain the role of accountants in the conceptual design stage. .
6 Views
View Answer
6.Which backup technique is most appropriate for sequential batch systems? a.grandfather-father-son approach b.staggered backup approach c.direct backup d.remote site, intermittent backup 7.When creating and controlling backups for a sequential batch system, a.the number of backup versions retained depends on the amount of data in the file b.off-site backups are not required c.backup files can never be used for.
6 Views
View Answer
11.A second site backup agreement between two or more firms with compatible computer facilities to assist each other with data processing needs in an emergency is called a.internally provided backup b.recovery operations center c.empty shell d.mutual aid pact 12.The major disadvantage of an empty shell solution as a second site backup is a.the host site may.
7 Views
View Answer
14.Describe a risk associated with the phased cutover procedure for data conversion. 15.List the attributes of output views. 16.What are embedded instructions? Why do they matter? 17.What are the two methods of electronic input? How do they differ? 18.Describe the Cold Turkey (or Big Bang) approach to system cutover. 19.Discuss the advantage of the parallel.
7 Views
View Answer
31.The accountant’s role in systems analysis includes all of the following except a.specify audit trail requirements b.prepare data gathering questionnaires c.suggest inclusion of advanced audit features d.ensure mandated procedures are part of the design 32.The role of the steering committee includes a.designing the system outputs b.resolving conflicts that arise from a new system c.selecting the programming techniques to.
7 Views
View Answer
TRUE/FALSE 1.In a computerized environment, the audit trail log must be printed onto paper documents. 2.Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling. 3.Access controls take on increased importance in a computerized environment because all of the records.
15 Views
View Answer
6.Define general controls. 7.Discuss the key features of Section 302 of the Sarbanes-Oxley Act. 8.What the three primary CBIS functions that must be separated? 9.List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated. 10.For disaster recovery purposes,.
6 Views
View Answer
5.Discuss the advantages and disadvantages of the three methods of converting to a new system: cold turkey cutover, phased cutover, and parallel operation cutover. 6.What issues must be considered in designing hardcopy documents? 7.What is the role of test data? What is a base case? 8.Correctly designed modules possess two attributes. Name and.
9 Views
View Answer
MULTIPLE CHOICE 1.When studying the detailed feasibility of a new project a.prototyping does not affect the schedule feasibility analysis b.the need for user training will influence the schedule feasibility analysis c.protection from fraud and errors will influence the schedule feasibility analysis d.a cost-benefit review will affect the schedule feasibility analysis 2.Protection from inadvertent disclosures of confidential.
6 Views
View Answer
6.Define risk in an electronic commerce setting. 7.Discuss the four areas of concern as they are related to e-commerce: data security, business policy, privacy, and business process integrity. 8.Define and contrast digital certificate and digital signature. 9.Explain the function of the two parts of the TCP/IP protocol. 10.What are network protocols? What functions do.
3 Views
View Answer
TRUE/FALSE 1.The majority of the cost of a system is incurred in the new systems development phase of the life cycle. 2.According to the text, a stakeholder is an end user of a system. 3.The objective of systems planning is to link systems projects to the strategic objectives of the firm. 4.The Systems Development.
20 Views
View Answer
26.In an Electronic Data Interchange (EDI) environment, when the auditor compares the terms of the trading partner agreement against the access privileges stated in the database authority table, the auditor is testing which audit objective? a.all EDI transactions are authorized b.unauthorized trading partners cannot gain access to database records c.authorized trading partners have.
6 Views
View Answer
MULTIPLE CHOICE 1.Which statement is not true? a.prototypes do not include internal control features b.a prototype is an inexpensive, simplified model of a system c.a throwaway prototype is discarded after the requirements are established d.systems designers always discard prototypes and do not develop them into finished systems 2.Which statement is not true? Computer Aided Software Engineering.
7 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16689 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!