Info
Warning
Danger

Study Resources (Accounting)

5.3   Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds. 1) Lapping is best described as the process of A) applying cash receipts to a different customer's account in an attempt to conceal previous thefts of cash receipts. B) inflating bank.
3 Views
View Answer
7.4   Describe the four types of control objectives that companies need to set. 1 According to the ERM, these help the company address all applicable laws and regulations. A compliance objectives B operations objectives C reporting objectives D strategic objectives 2 According to the ERM, high level goals that are aligned with and support the.
4 Views
View Answer
10.1   Identify and explain controls designed to ensure processing integrity. 1 The best example of an effective payroll transaction file hash total would most likely be A sum of net pay. B total number of employees. C sum of hours worked. D total of employees' social security numbers. 2 Error logs and review are an example.
16 Views
View Answer
7.8   Describe how to communicate information and monitor control processes in organizations. 1 Which component of the COSO Enterprise Risk Management Integrated Framework is concerned with understanding how transactions are initiated, data are captured and processed, and information is reported? A information and communication B internal environment C event identification D objective setting 2 Which of.
7 Views
View Answer
12.1   Describe the basic business activities and related information processing operations performed in the revenue cycle. 1 Basic segregation of duties requires the credit manager reports to the ________ and the treasurer report to the ________. A treasurer; controller B treasurer; vice president of finance C controller; vice president of finance.
12 Views
View Answer
11.3   Describe the different tools and techniques auditors use to test software programs and program logic. 1 Identify the activity below that the external auditor should not be involved. A examining system access logs B developing the information system C examining logical access policies and procedures D making recommendations to management for improvement.
5 Views
View Answer
6.2   Explain how social engineering techniques are used to gain physical or logical access to computer resources. 1. Mircea Vasilescu maintains an online brokerage account. In early March, Mircea received an e-mail from the firm that explained that there had been a computer error and asked Mircea to call a phone.
9 Views
View Answer
11.1   Describe the nature, scope and objective of audit work, and identify the major steps in the audit process. 1 Auditing involves the A collection, review, and documentation of audit evidence. B planning and verification of economic events. C collection of audit evidence and approval of economic events. D testing, documentation,.
14 Views
View Answer
8 During the sales order entry process, a ________ is performed to verify that each transaction record contains all appropriate data items. A completeness test B redundant data check C field check D reasonableness test 9 The best solution for maintaining accurate automated perpetual inventory system is to use A closed-loop.
5 Views
View Answer
7.3   Describe the major elements in the internal environment of a company. 1 Rauol is a receptionist for The South American Paper Company, which has strict corporate policies on appropriate use of corporate resources. The first week of March, Rauol saw Jim (the branch manager putting printer paper and toner into.
6 Views
View Answer
9.3   Explain how the two basic types of encryption systems work. 1 Which of the following is not true regarding virtual private networks (VPN? A VPNs provide the functionality of a privately owned network using the Internet. B Using VPN software to encrypt information while it is in transit over the Internet in.
7 Views
View Answer
5.1   Explain the threats faced by modern information systems. 1) Perhaps the most striking fact about natural disasters in relation to AIS controls is that A) many companies in one location can be seriously affected at one time by a disaster. B) losses are absolutely unpreventable. C) there are a large.
18 Views
View Answer
16 The evidence collection method that examines all supporting documents to determine the validity of a transaction is called A review of documentation. B vouching. C physical examination. D analytical review. 17 The evidence collection method that considers the relationships and trends among information to detect items that should be.
6 Views
View Answer
11.4   Describe computer audit software, and explain how it is used in the audit of an AIS. 1 An audit software program that generates programs that perform certain audit functions, based on auditor specifications, is referred to as a(n A input controls matrix. B CAATS. C embedded audit module. D mapping.
6 Views
View Answer
46) Identify the department below that should not be able to submit a purchase requisition. A) Marketing B) Production C) Inventory Control D) None of the above 47) Once a purchase request is approved, what is the next step? A) The system creates a purchase order. B) The accounts payable department approves the purchase request, creating a.
2 Views
View Answer
5.5   Explain how to prevent and detect computer fraud and abuse. 1) Most frauds are detected by A) external auditors. B) hotline tip. C) internal auditors. D) the police. 2) Which of the following will not reduce the likelihood of an occurrence of fraud? A) encryption of data and programs B) use of forensic accountants C).
6 Views
View Answer
9.1   Identify and explain controls designed to protect the confidentiality of sensitive corporate information. 1 Identify the type of information below that is least likely to be considered "sensitive" by an organization. A financial statements B legal documents C strategic plans D product cost information 2 Which of the following is not one of the basic.
16 Views
View Answer
7.2   Compare and contrast the COBIT, COSO, and ERM control frameworks. 1 Which of the below is not a component of the COSO ERM? A monitoring B control environment C risk assessment D compliance with federal, state, or local laws 2 The COSO Enterprise Risk Management Integrated Framework stresses that A risk management.
7 Views
View Answer
31) There is a symmetrical interdependence between a firm's expenditure cycle and its suppliers' A) production cycle. B) revenue cycle. C) expenditure cycle. D) general ledger and reporting system. 32) The Gwallter Reece Chihuahua Sweater Co. (GRCCo) was established in 2013. It recently signed a large contract with PetCo pet stores. GRCCo will be required.
3 Views
View Answer
13.1   Explain the basic business activities and related information processing operations performed in the expenditure cycle. 1) The Gwallter Reece Chihuahua Sweater Co. (GRCCo) was established in 2013. It recently signed a large contract with PetCo pet stores. GRCCo will be required to track and forecast sweater sales by linking in.
11 Views
View Answer
7.1   Explain basic control concepts and explain why computer control and security are important. 1 Why are threats to accounting information systems increasing? A Many companies do not realize that data security is crucial to their survival. B LANs and client/server systems are easier to control than centralized, mainframe systems. C Many.
14 Views
View Answer
10.2   Identify and explain controls designed to ensure systems availability. 1 What is the most effective way to ensure information system availability? A high bandwidth B maintain a hot site C maintain a cold site D frequent backups 2 Which of the following statements is true with regards to system availability? A Human error does not threaten.
6 Views
View Answer
4.6   Perform simple queries using the Microsoft Access database. 1. Which one of the following results corresponds to the query below? A. B. C. D. 2. Which one of the following results corresponds to the query below? A. B. C. D. 3. Which one of the following results corresponds to the query.
8 Views
View Answer
6.1   Compare and contrast computer attack and abuse tactics. 1. ________ consists of the unauthorized copying of company data. A. Phishing B. Masquerading C. Data leakage D. Eavesdropping 2. Individuals who use telephone lines to commit fraud and other illegal acts are typically called A. phreakers. B. crackers. C. phishers. D. hackers. 3. What is a denial.
16 Views
View Answer
8.2   Discuss how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about the security of an organization's information system. 1 Identify the statement below which is not a useful control procedure regarding access to system outputs. A restricting access to rooms with printers B coding.
38 Views
View Answer
11.2   Identify the six objectives of an information system audit, and describe how the risk-based audit approach can be used to accomplish these objectives. 1 What is the purpose of an information systems audit? A to determine the inherent risk factors found in the system B to review and evaluate the.
4 Views
View Answer
31 Which of the following is not one of the types of internal audits? A reviewing corporate organizational structure and reporting hierarchies B examining procedures for reporting and disposing of hazardous waste C reviewing source documents and general ledger accounts to determine integrity of recorded transactions D comparing estimates and analysis made before purchase.
4 Views
View Answer
31 This control ensures that the correct and most current files are being updated. A cross-footing balance test B data matching C file labels D write-protect mechanism 32 This batch processing data entry control sums the number of items in a batch. A financial total B hash total C record count D sequence check 33 This data entry.
6 Views
View Answer
10 Whitewater Rapids provides canoes to tourists eager to ride Whitewater river's rapids. Management has determined that there is one chance in a thousand of a customer being injured or killed. Settlement of resulting lawsuits has an average cost of $650,000. Insurance with a $50,000 deductible is available. It covers.
4 Views
View Answer
16 Parity checks are an example of a(n A data entry control. B data transmission control. C output control. D processing control. 17 A user review an example of A a data entry control. B a data transmission control. C an output control. D a processing control. 18 Data matching is an example of a(n A data entry control. B data transmission.
12 Views
View Answer
16 A method for tracking accounts receivable that matches specific invoices and payments from the customer is called a(n ________ method. A specific identification B balance forward C cycle billing D open-invoice 17 The document a customer returns with their payment and that identifies the source and the amount of the.
8 Views
View Answer
31 In recent years, many of the attacks carried out by hackers have relied on this type of vulnerability in computer software. A code mastication B boot sector corruption C weak authentication D buffer overflow 32 Noseybook is a social networking site that boasts over a million registered users and a quarterly membership growth rate.
14 Views
View Answer
33 Explain how validity checks, completeness tests and reasonableness tests can be implemented to ensure accuracy of customer orders. 34 Failure to collect cash on credit sales is a threat in the revenue cycle. What controls can be used to help neutralize this threat? 35 Describe four threats in the revenue.
3 Views
View Answer
8.1   Explain how information security affects information systems reliability. 1 The Trust Services Framework reliability principle that states that users must be able to enter, update, and retrieve data during agreed-upon times is known as A availability. B security. C maintainability. D integrity. 2 According to the Trust Services Framework, the.
16 Views
View Answer
16 The accounting department at Aglaya Telecom records an average of 5,000 transactions per hour. A cost-benefit analysis leads management to conclude that the maximum acceptable amount of data loss is 20,000 transactions. If the firm's recovery time objective is 60 minutes, then the worst case recovery time objective is A.
5 Views
View Answer
5.4   Define computer fraud and discuss the different computer fraud classifications. 1) Which of the following is least likely to result in computer fraud? A) releasing data to unauthorized users B) allowing computer users to test software upgrades C) allowing computer operators full access to the computer room D) storing backup tapes in a location.
11 Views
View Answer

Welcome Back!

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Forgot?
Login
Don't have an account? Signup

Join ScholarOn

ScholarOn has more then 20 Million answers, flashcards & more being added everyday!

or
Signup
By registering, I agree to the Terms and Privacy Policies
Already have an account? Log in

Verify Your Email

Check your inbox & click on the link to activate your account.

Resend Email
Verification Mail Send Successfully. Please Check Your Email.

Forgot Password

Please enter your registered email to recieve the password reset link.

Send reset link
Already have an account? Log in
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!

d
Let us boost your grade together!

Get 24/7 homework help from Experts

Let our knowledge be your backup

1

Submit your homework question or assignment

2

Receive a quote & Make the Payment

3

Sit Back & Relax to Earn Better Grades!

Drag files here or Browse your Device

Maximum file size 10MB
17,475 Accounting Questions Answered! Get Answer

We are The Best Because

  • On Time Delivery
  • Plagiarism ReportFree
  • Unlimited RevisionsFree
  • 100% Privacy & Confidential
  • 24/7 Live Chat Support
4.9 (16463 Ratings)
You can communicate directly with your expert until the solution quality is delivered to your complete satisfaction.
Looking for writing help?
Did you know?

ScholarOn has more than 2 Million+ answers, textbook solutions & flashcards. Explore Now!