A bar code reader is to be used by which type of system

Assignment Help Basic Computer Science
Reference no: EM13927044

1. Which of the following best describes a data warehouse as described in the chapter?

a) A repository of historical information from one accounting application

b) A repository of historical information from a set of accounting applications

c) A repository of information from many business applications-some not accounting

d) A repository of information from many businesses in the same industry

2. All of the following are possible uses of AIS or accounting personnel that were discussed in the chapter EXCEPT:

a) Countering terrorism

b) Foiling future accounting scandals

c) Providing assurance services

d) Performing monetary exchanges

3. Justifying expenditures for new technologies is especially difficult because:

a) You do not know how many jobs will be affected

b) Expenses are often recurring and are difficult to estimate

c) Many benefits are intangible and are not easily known or measured

d) Justifying a new technology is no different from any other capital budgeting problem

4. What has been the effect on accountants in those organizations which have computerized their data processing functions?

a) The need for accountants has disappeared

b) The accountants have become "pure" bookkeepers

c) The accountants have become involved in more decision-making activities

d) The accountants' decision-making activities have drastically declined

5. The principal cause for more timely performance reports in the typical modern organization is due to:

a) Better educated management

b) Adoption of progressive management philosophies which stress participative management (e.g., MBO)

c) Information processing systems

d) Need for less information

6. A good performance measurement system should evaluate:

a) Profitability only

b) Customer satisfaction only

c) All aspects of a unit's performance subject to control

d) All aspects of a unit's performance whether controllable or not

7. The term data encryption refers to:

a) Storing data in a safe place called EDGAR

b) Transforming data into secret codes

c) Scrambling data in random ways that cannot be unscrambled

d) Documenting data security techniques

8. All of the following are examples of EDI "documents" EXCEPT:

a) Purchase orders

b) Sales invoices

c) Customs documents

d) Payroll checks

9. The term key in the context of data encryption refers to:

a) A physical key similar to a house key

b) A logical key similar to the primary key of a data file

c) A mathematical function used for encryption purposes

d) A computer function key that can be found on keyboards

10. A proxy server is:

a) A type of computer network often used by companies with many employees

b) An alternate for a company mainframe computer

c) A computer dedicated to company networks

d) A computer dedicated to Internet access and transfers

11. Because Internet software is so convenient to use, many companies also create their own __________________ for internal

communications purposes.

a) Intranets

b) Extranets

c) Firewalls

d) Domain address

12. Those companies which prefer VANs to the Internet for implementing EDI do so for what main reason?

a) Cost - VANs are cheaper than the Internet

b) Speed - VANs are faster than the Internet

c) Security - VANs are thought to be more secure

d) Convenience - VANs are everywhere

13. The hardware of a computer system includes the computer itself and other devices that help the computer perform its

tasks. These "other devices" are commonly also called:

a) Helper equipment

b) IT devices

c) Peripheral equipment

d) Secondary equipment

e) Accessory equipment

14. Time cards, packing slips, reservation screens, and bank deposits screens best describes which of the following?

a) Data transcription

b) Point-of-sale devices

c) Source documents

d) Turnaround documents

e) Data transaction documents

15. Which of the following is the most important reason to use POS systems, OCR systems, or MICR systems?

a) To use the latest information technology

b) To avoid data transcription

c) To create an extra layer of IT infrastructure

d) To decrease dependency on foreign oil

16. A POS device is usually attached to a:

a) Printer

b) Bank check

c) Cash register

d) Keyboard

e) Computer mouse

17. A portable computing device that enables users to maintain personal data like addresses, appointment calendars, and

check registers and that can also include wireless technology and digital cameras:

a) PDA

b) Minicomputer

c) Personal Computer

d) CPU

18. A bar code reader is most likely to be used by which type of system?

a) POS system

b) MICR system

c) Printer/scanner system

d) Fax machine system

19. Three objectives of a company's internal control system should be safeguarding assets, checking the accuracy and

reliability of accounting data, and promoting operational efficiency. A fourth objective of a company's internal control system

should be:

a) Preventing embezzlement of assets

b) Encouraging adherence to prescribed managerial policies

c) Avoiding the payment of overtime to company employees

d) Revising standards for production costs on a weekly basis

20. Regarding the cost-benefit concept, which of the following statements is true?

a) Every control procedure that offers benefits to a company should be implemented into the company's system

b) An optimal internal control package is developed for a company's system by implementing a standardized package of

control procedures

c) A control procedure is considered cost effective if it can be determined that the cost of operating the procedure will be

cheaper in the current period compared to the previous period

d) A control procedure is considered cost effective when its anticipated benefits exceed its anticipated costs

21. If the same employee is responsible for authorizing a business transaction and recording the transaction in the accounting

records, this indicates a weakness in which element of a company's internal control system?

a) A good audit trail

b) Separation of duties

c) Internal review of controls

d) Competent employees

22. Logical access to the computer system would be best controlled by:

a) Intrusion alarm systems

b) Complex operating systems

c) Restrictions on physical access to online terminals

d) Password codes

23. From the standpoint of computer fraud, which type of controls would probably be of highest importance?

a) Input controls

b) Access controls

c) Output controls

d) Processing controls

24. An apparent error in input data describing an inventory item received was referred back to the originating department for

correction. A week later the department complained that the inventory in question was incorrect. Data processing could not

easily determine whether or not the item had been processed by the computer. The best control procedure would be:

a) Input edit checks

b) Missing data validity check

c) Transmittal control

d) An error log

25. Software that enables businesses and government agencies to transmit and manipulate financial data on an

organization-wide basis best describes:

a) Communication software

b) CAD software

c) Enterprise resource planning (ERP) software

d) Programming software

26. Software used for preparing payrolls, maintaining accounts receivable files, controlling inventory best describes:

a) Communication software

b) Personal productivity software

c) Project management software

d) Accounting software

27. The translation process of converting source code into machine language (object code) is performed by which of the

following?

a) Utility program

b) System software

c) ERP (Enterprise Resource Management) software

d) Compiler

28. Menus, icons, and other graphical elements are an example of which of the following?

a) Utility programs

b) Personal productivity software

c) Virtual Storage

d) Graphical user interface (GUI)

29. Programs that help users perform such tasks as copying files, converting files from one format to another, compressing

files, performing system diagnostics, and building disk directories best describes which of the following?

a) Antivirus software

b) Utility programs

c) Application software

d) Operating system software

30. An intensive investigation of a company's present information system in order to discover systems weaknesses is termed

a) Systems study

b) Systems follow up

c) Systems design

d) Systems survey

31. Which of these is NOT a phase in the life cycle of an information system?

a) Planning

b) Analysis

c) Control

d) Implementation

32. The four phases of the systems development life cycle end with this phase:

a) Analysis

b) Design

c) Implementation, follow-up, and maintenance

d) Development

33. Which of the following is least likely to be a member of a study team?

a) CEO of a company

b) Internal auditor or accountant

c) IT specialist

d) Middle-level manager who uses the system

34. Which of these is NOT a general systems goal?

a) Relevant output

b) Cost awareness

c) Flexible structure

d) Higher salaries

35. Which of these comes closest in meaning to the term "systems approach?"

a) Narrow point of view

b) Broad point of view

c) Focus on achieving those goals important to computerized systems

d) Focus first and foremost on computerization

36. Which of these should come first when performing a systems study?

a) Systems analysis

b) Systems design

c) Preliminary investigation

d) Systems development

37. This type of survey instrument best allows employees to answer in their own words:

a) Open-ended questionnaire

b) Closed-ended questionnaire

c) Multiple-choice questionnaire

d) Fill-in-the-blank questionnaire

38. Which of these is NOT a logical procedure that is followed in the systems analysis phase of a systems study?

a) Define the problem(s) in the current system

b) Identify the company's goals

c) Perform a systems survey to acquire information about the current system

d) Generate possible solutions to solve the company's problem(s)

39. Which of the following is NOT a general objective in the design of an information system?

a) A system should provide information which is timely and relevant for decision making by management and operating

personnel

b) The output of a system should be highly accurate

c) A system should have sufficient capacity to accommodate levels of normal activity; any additional capacity proves too costly

in the long run

d) A system should be as simple as permitted so that its structure and operation can be easily understood and its procedures

easily accomplished

e) A system should be flexible to accommodate changes of a reasonable magnitude when required

40. In conducting a feasibility study, operational feasibility refers to whether:

a) A proposed system is attainable given the existing technology

b) A manager can coordinate and control the activities of the systems department

c) An adequate computer site exists for the proposed system

d) The proposed system will produce economic benefits which exceed the costs

e) The system will be used effectively within the operating environment of an organization

41. A simple diagram that shows estimated completion times versus actual completion times for the various activities in a

systems implementation project is a(n):

a) E-R diagram

b) PERT chart

c) Gantt chart

d) Data flow diagram

42. Documentation includes:

a) All flowcharts, narratives, and other written communications associated with the information system

b) All written communications associated with an accounting information system except flowcharts and data flow diagrams

c) All flowcharts, narratives, and other written communications associated with an accounting information system, except for

program flowcharts, decision tables, and pseudocode

d) Flowcharts and data flow diagrams only

43. When an individual prepares a document flowchart, the names of the various organizational departments involved in the

accounting information system should be listed:

a) Along the right-hand margin of the flowchart

b) Along the left-hand margin of the flowchart

c) In the title of the flowchart

d) In the column headings of the flowchart

44. Most system flowcharting symbols:

a) Have not been standardized

b) Have been standardized by the Society of System Analysts

c) Have been standardized by the National Bureau of Standards

d) Are unique to the organization that uses them

45. Data flow diagrams:

a) Accomplish the same purpose as system flowcharts

b) Are different from system flowcharts since they focus on a logical view of the information system

c) Are useless for planning a new system

d) Are never used in analyzing an existing system

46. All of these are levels of a data flow diagram EXCEPT:

a) Physical data flow diagram

b) Process diagram

c) Context diagram

d) Logical data flow diagram

47. Which of the following is NOT an advantage of decision tables?

a) They document the logic of the computer program

b) They show the order in which data conditions are tested and/or processing actions are taken

c) They increase computer programmer productivity

d) They summarize the data processing tasks to be performed for a large number of data conditions in a compact format

48. The basic unit of information on a computer file of accounting data is a(n):

a) Inventory part number

b) Data field

c) Computer record

d) Bit

49. The data item which uniquely identifies a computer record in an AIS database table is called the:

a) Pointer address

b) Primary record key

c) Employee number

d) Header label

e) Sort field

50. This item creates relationships by linking the data in one file (e.g., customer) to an item in a second file (e.g., a sales

order):

a) Foreign key

b) Data dictionary

c) Relationships link bit

d) Index file

51. The reason why database designers normalize data is:

a) To eliminate data errors

b) To scale data properly

c) To create backup copies of data

d) To create efficient database tables

52. You are defining a database table. Which of the following best explains why you would assign a Social Security number field

as a text field?

a) The field will not be manipulated mathematically

b) This is the default data type for most DBMS table fields

c) The field is too long to define as a numerical field

d) You plan to use this field as a primary key, which must therefore be a text field

53. You are defining a database table. Which of these data types would be best for the product code of an inventory table?

a) Text

b) Numeric

c) Currency

d) Memo

54. According to the text, which of these statements is most accurate?

a) Most computer abuse is performed as retaliation against employers

b) Very little computer crime is committed for personal gain

c) Some computer abuse is performed simply to meet a challenge

d) We catch most computer abusers with good accounting controls

55. The best explanation for the absence of complete information on computer crime would be:

a) Abuse is handled as an internal matter

b) Hesitant disclosure of abuse due to embarrassment

c) Documentation of abuses hasn't caught up with actual abuses

d) Most computer crime is not caught

56. One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or

tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the

perpetrator can change data before, during, or after they are entered into a computer system?:

a) Salami technique

b) Data diddling

c) Shoulder surfing

d) Trojan horse program

57. In thwarting computer abuse, which of the following is true?:

a) It is not important to enlist the support of top management

b) Many IT managers do not think computer abuse is very important

c) Computer crime mostly means controlling computer hardware

d) Most computer crime happens because of a failure of controls, not an absence of controls

58. Probably the most important federal legislation governing activities involving computers is:

a) CAN-SPAM Act of 2003

b) Federal Privacy Act of 1974

c) Computer Fraud and Abuse Act of 1986

d) Cyber Security Act of 1987

59. Which of the following is probably the primary reason accountants should be concerned about computer crime and abuse?

a) They might lose their job if they don't detect computer crime or abuse in their organization

b) They might lose their professional credibility and license if computer crime or abuse continues for a long time in their

organization and they do not detect it

c) They are responsible for designing, implementing, and monitoring the control procedures for AISs

d) all of the above are equally important

Reference no: EM13927044

Questions Cloud

Cognitive behavioral therapy : Cognitive Behavioral Therapy can be effective in helping older adults in life because "Cognitive-behavioral therapy (CBT) is a popular and em­pirically supported treatment for a number of common mental health problems, including mild to moderate m..
Lease versus buy decision : Use of the time value of money concept applied to the lease versus buy decision. How does TVM affect the options involved
Temporary pass for ten uses of the facility : MRC sells a temporary pass for ten uses of the facility for a cost of $80
Determine the annual net benefits to great lakes oil : Determine the annual net (pretax) benefits to Great Lakes Oil of establishing a lock-box system with the Salt Lake City bank. Which of the two lockbox systems (if any) should the firm select?
A bar code reader is to be used by which type of system : One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or tangible property through the use of computers.
Design issues you experienced in creating your survey : Research and annotated bibliography using the University Library, reference four to six peer reviewed articles that you could use as sources for your week four presentation. Briefly explain how these articles will be useful as references for your ..
Business research process from your experience : Write a 300-word summary of the business research process by describing the business research process from your experience in the workplace or in an article you find through the University Library.
What the different theories of organizational leadership are : Choose 3 different approaches to leadership and write a 1-2 page paper that covers the following: Write a 1 paragraph introduction to briefly explain what the different theories of organizational leadership are
Strength of the composite material : The E-Glass fibers have a tensile modulus of  10x106 psi, and a tensile strength of 0.35x106 psi. The epoxy matrix has a tensile modulus of 0.45x106 psi, and a tensile strength of 9.0x103 psi. What is the strength of the composite material and what f..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Determine the funds received and use the text to column

In this project, you will be assigned the task to record money received for a school fundraiser and create an Excel spreadsheet to record your receipts. You will determine the funds received and use the text to column feature

  A research paper done two pages of content

A research paper done two pages of content, as well as a reference page . Research Paper= identifying the key components of information systems management . Select three out of the six questions below, and provide detailed answers, supporting those a..

  Compare and contrast the mmorpg interaction environment

Describe cognitive social phenomena that occur specifically to the context of the MMORPG that wouldn't happen in a face-to-face chess game. Compare and contrast the MMORPG interaction environment and a face-to-face environment where chess is being..

  What is a packet? what is packet switching

What is a packet? What is packet switching?How would you explain the concept of packet switching?What are the advantages and disadvantages of packet switching over circuit switching?

  Active directory user object creation tool

Determine at least two (2) Windows Server 2012 Active Directory user creation scenarios and specify one (1) Active Directory user object creation tool that you believe is the most efficient for each scenario.

  Imagine you are a senior systems administrator

Imagine you are a senior systems administrator who has recently been given the task to help improve security of your company's IT infrastructure after a series of network security breaches. These breaches included someone accessing the network ..

  Display the total and average number of calories burned

How would you solve the following in C++? Please write code below: Write a condition-controlled while loop that allows the user to enter the calories they burned. Stop looping when the user enters a negative number. Display the Total and Average n..

  In network cabling technology

In network cabling technology, what does the "100" in 100BaseT stand for?n network cabling technology, what does the "100" in 100BaseT stand for?

  Explain the three main channels

Explain the three main channels (not the Fed's tools: omo, rr, dr) through which the Fed can influence economic activity. Specifically explain the ways that Fed policy can influence consumption and investment.

  Video centers of europe ltd. data warehouse

Video Centers of Europe, Ltd. data warehouse

  Cores on computer systems

Cores on Computer Systems

  Challenges of a computer forensics specialist

Assignment: Computer Forensics Overview, Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd