Info
Warning
Danger

Study Resources (Accounting)

MULTIPLE CHOICE 1.Which statement is not true? a.prototypes do not include internal control features b.a prototype is an inexpensive, simplified model of a system c.a throwaway prototype is discarded after the requirements are established d.systems designers always discard prototypes and do not develop them into finished systems 2.Which statement is not true? Computer Aided Software Engineering.
24 Views
View Answer
6.What is meant by “object-oriented design?” What does it mean for systems design? 7.List three advantages and one disadvantage of commercial software. 8.What is the purpose of the Request for Proposal (RFP)? 9.Explain how a benchmark problem is used to measure the performance of two different commercial software packages. 10.Contrast the structured and object-oriented.
12 Views
View Answer
21.Correctly designed, processing modules are tightly coupled and have strong cohesion. 22.A system walkthrough occurs after the system is implemented. 23.The detailed design report is the “blueprint” which guides programmers and database administrators in constructing the physical system. 24.When a program module is tested, both good and bad data are included with the.
10 Views
View Answer
10.Contrast the preliminary project feasibility study with the feasibility study performed in the systems evaluation and selection phase of the SDLC. 11.Part of systems planning is a project feasibility study. Several feasibility issues can be raised. What are they? Explain the key concerns. 12.Explain the role of accountants in the conceptual design.
17 Views
View Answer
ESSAY 1.Describe at least four advantages and two disadvantages of the Computer Aided Software Engineering (CASE) approach. 2.CASE tools develop systems without the intermediate step of writing human readable source code. This can pose some concerns for accountants. What are they? 3.Discuss the appropriate steps to take when selecting a commercial software package. .
14 Views
View Answer
11.What are cookies and why are they used? 12.List at least five top-level domain names used in the United States. 13.When are networks connected with a bridge and with a gateway? 14.Describe an advantage to the client/server topology. 15.Describe one primary advantage of polling as a network control method. .
7 Views
View Answer
21.The fundamental difference between internal and external auditing is that a.internal auditors represent the interests of management and external auditors represent outsiders b.internal auditors perform IT audits and external auditors perform financial statement audits c.internal auditors focus on financial statement audits and external auditors focus on operational audits and financial statement audits d.external auditors.
8 Views
View Answer
31.Which statement is not true? A systems design walkthrough a.is conducted by a quality assurance group b.occurs just after system implementation c.simulates the operation of the system in order to uncover errors and omissions d.reduces costs by reducing the amount of reprogramming 32.System documentation is designed for all of the following groups except a.systems designers and.
15 Views
View Answer
TRUE/FALSE 1.The majority of the cost of a system is incurred in the new systems development phase of the life cycle. 2.According to the text, a stakeholder is an end user of a system. 3.The objective of systems planning is to link systems projects to the strategic objectives of the firm. 4.The Systems Development.
23 Views
View Answer
TRUE/FALSE 1.Corporate management (including the CEO) must certify monthly and annually their organization’s internal controls over financial reporting. 2.Both the SEC and the PCAOB requires management to use the COBIT framework for assessing internal control adequacy. 3.Both the SEC and the PCAOB requires management to use the COSO framework for assessing internal control.
19 Views
View Answer
11.Which statement is not correct? The structured design approach a.is a top-down approach b.is documented by data flow diagrams and structure diagrams c.assembles reusable modules rather than creating systems from scratch d.starts with an abstract description of the system and redefines it to produce a more detailed description of the system 12.The benefits of the.
12 Views
View Answer
SHORT ANSWER 1.Why is it important that the systems professionals who design a project not perform the detailed feasibility study of the project? 2.List at least three one-time costs and three recurring costs in system development. 3.____________________ benefits can be measured and expressed in financial terms, while ____________________ benefits cannot be easily measured.
15 Views
View Answer
SHORT ANSWER 1.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe a disadvantage associated with this procedure. 2.Using Computer Aided Software Engineering (CASE) tools, the structure diagram can be transformed into machine code. Describe an advantage associated with this procedure. 3.What is prototyping? Why is.
11 Views
View Answer
11.A tangible benefit a.can be measured and expressed in financial terms b.might increase revenues c.might decrease costs d.all of the above 12.Intangible benefits a.are easily measured b.are of relatively little importance in making information system decisions c.are sometimes estimated using customer satisfaction surveys d.when measured, do not lend themselves to manipulation 13.Which technique is least likely to be used to.
11 Views
View Answer
11.Describe the components of a disaster recovery plan. 12.What is a mirrored data center? 13.Why is supervisory control more elaborate in the CBIS environment than in the manual environment? 14.What are some control implications of the distributed data processing model? 15.What is program fraud? .
6 Views
View Answer
31.The accountant’s role in systems analysis includes all of the following except a.specify audit trail requirements b.prepare data gathering questionnaires c.suggest inclusion of advanced audit features d.ensure mandated procedures are part of the design 32.The role of the steering committee includes a.designing the system outputs b.resolving conflicts that arise from a new system c.selecting the programming techniques to.
12 Views
View Answer
11.Instead of implementing an application in a single “big-bang” release, modern systems are delivered in parts continuously and quickly 12.When the nature of the project and the needs of the user permit, most organizations will seek a pre-coded commercial software package rather than develop a systems in-house. 13.All of the steps in.
14 Views
View Answer
11.In the object-oriented approach to systems design, when an operation is performed on an object, an attribute will always be changed. 12.In the object-oriented approach to systems design, inheritance means that each object instance inherits the attributes and operations of the class to which it belongs. 13.In the object-oriented approach to systems.
12 Views
View Answer
11.List three characteristics that should be considered when designing a hardcopy input form. 12.List two techniques of forms design that encourage efficient and effective data collection. 13.What is the importance of the base case? 14.Describe a risk associated with the phased cutover procedure for data conversion. 15.List the attributes of output views. .
10 Views
View Answer
MULTIPLE CHOICE 1.Which of the following is NOT an implication of section 302 of the Sarbanes-Oxley Act? a.Auditors must determine, whether changes in internal control has, or is likely to, materially affect internal control over financial reporting. b.Auditors must interview management regarding significant changes in the design or operation of internal control that.
9 Views
View Answer
MULTIPLE CHOICE 1.What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area? a.LAN b.decentralized network c.multidrop network d.Intranet 2.Network protocols fulfill all of the following objectives except a.facilitate physical connection between network devices b.provide a basis for error checking and measuring network performance c.promote compatibility.
11 Views
View Answer
3.Define the feasibility measures that should be considered during project analysis and give an example of each. 4.Explain the role of accountants in the conceptual design stage. 5.Contrast the feasibility study performed in the systems analysis phase of the Systems Development Life Cycle (SDLC) with the study performed in the systems selection.
9 Views
View Answer
6.Contrast reactive and proactive management styles. 7.Explain why accountants are interested in the legal feasibility of a new systems project. 8.Explain an advantage of surveying the current system when preparing a systems analysis for a new systems project. 9.What are two purposes of the systems project proposal? 10.List two ways that a systems project.
16 Views
View Answer
4.The Studebaker Company is evaluating two proposals for a commercial software package. Three relevant factors were identified and weighted. Then the evaluation team assigned raw scores from 1 to 5 to each factor for each vendor. Proposal One will cost $70,000 and Proposal Two will cost $65,000. ProposalProposal WeightOneTwo Vendor support3045 Ease of use3054 Range.
9 Views
View Answer
TRUE/FALSE 1.The detailed design phase of the Systems Development Life Cycle is a linear process with each of five steps occurring once and in its proper sequence. 2.In a Computer Aided Software Engineering (CASE) environment, the most important use of a data flow diagram is to present a graphic display of the.
24 Views
View Answer
21.The degree of compatibility between the firm’s existing procedures and personnel skills and the requirements of the new system is called a.technical feasibility b.operational feasibility c.schedule feasibility d.legal feasibility 22.The ability of a system to protect individual privacy and confidentiality is an example of a.schedule feasibility b.operational feasibility c.legal feasibility d.economic feasibility 23.The systems project proposal a.provides management with a basis.
11 Views
View Answer
11.List four types of facts that should be gathered during an analysis of a system. 12.What is the Internal Business Process Perspective? 13.What is the Learning and Growth Perspective? 14.When a company is doing financially well, why is the Customer Perspective measure important? 15.Distinguish between escapable and inescapable costs. Give an example. 16.Why is cost-benefit.
12 Views
View Answer
SHORT ANSWER 1.Which of the following statements is true? a.Both the SEC and the PCAOB requires the use of the COSO framework b.Both the SEC and the PCAOB requires the COBIT framework c.The SEC recommends COBIT and the PCAOB recommends COSO d.Any framework can be used that encompass all of COSO’s general themes 2.COSO identifies two.
9 Views
View Answer
11.A second site backup agreement between two or more firms with compatible computer facilities to assist each other with data processing needs in an emergency is called a.internally provided backup b.recovery operations center c.empty shell d.mutual aid pact 12.The major disadvantage of an empty shell solution as a second site backup is a.the host site may.
10 Views
View Answer
MULTIPLE CHOICE 1.When studying the detailed feasibility of a new project a.prototyping does not affect the schedule feasibility analysis b.the need for user training will influence the schedule feasibility analysis c.protection from fraud and errors will influence the schedule feasibility analysis d.a cost-benefit review will affect the schedule feasibility analysis 2.Protection from inadvertent disclosures of confidential.
12 Views
View Answer
11.Sniffer software is a.software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive b.used by network administrators to analyze network traffic c.used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions d.illegal programs downloaded from the Net to sniff.
4 Views
View Answer
21.Which of the following statements is correct? TCP/IP a.is the basic protocol that permits communication between Internet sites. b.controls Web browsers that access the WWW. c.is the file format used to produce Web pages. d.is a low-level encryption scheme used to secure transmissions in HTTP format. 22.FTP a.is the document format used to produce Web pages. b.controls.
6 Views
View Answer
11.A disaster recovery plan is a comprehensive statement of all actions to be taken after a disaster. 12.IT auditing is a small part of most external and internal audits. 13.Assurance services is an emerging field that goes beyond the auditor’s traditional attestation function. 14.An IT auditor expresses an opinion on the fairness of.
11 Views
View Answer
21.The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is a a.fully documented system report b.systems selection report c.detailed system design report d.systems analysis report 22.The detailed design report contains all of the following except a.input screen formats b.alternative conceptual designs c.report layouts d.process logic 23.When each element of information supports the user’s decision or.
9 Views
View Answer
21.In a hierarchical topology, network nodes communicate with each other via a central host computer. 22.Polling is one technique used to control data collisions. 23.The more individuals that need to exchange encrypted data, the greater the chance that the key will become known to an intruder.  To overcome this problem, private key.
9 Views
View Answer
6.Define general controls. 7.Discuss the key features of Section 302 of the Sarbanes-Oxley Act. 8.What the three primary CBIS functions that must be separated? 9.List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated. Functions to SeparateRisk Exposure ____________________________________________________ ____________________________________________________ ____________________________________________________ 10.For.
10 Views
View Answer
16.What are embedded instructions? Why do they matter? 17.What are the two methods of electronic input? How do they differ? 18.Describe the Cold Turkey (or Big Bang) approach to system cutover. 19.Discuss the advantage of the parallel operation cutover approach. 20.What is the objective of a post-implementation review? .
10 Views
View Answer
6.Explain why the Systems Development Life Cycle is of interest to accountants. What is the accountant’s role in the Systems Development Life Cycle? 7.What are three problems that account for most system failures? 8.What is Industry analysis and why do managers do it. 9.Why is the announcement of a new systems project so.
10 Views
View Answer