Computerized Accounting Chapter Exam Questions - 1942 Verified Questions

Page 1


Computerized Accounting

Chapter Exam Questions

Course Introduction

Computerized Accounting introduces students to the use of accounting software applications in recording, processing, and managing financial transactions. The course emphasizes the practical application of computerized systems to perform tasks such as general ledger maintenance, accounts receivable and payable, inventory management, payroll preparation, and financial statement generation. Students gain hands-on experience through case studies and simulated business scenarios, developing skills necessary for efficient use of technology in modern accounting environments. The course highlights the benefits of automation, accuracy, and real-time reporting, while also addressing data security and internal controls within computerized accounting systems.

Recommended Textbook

Accounting Information Systems 11th Edition by George H. Bodnar

Available Study Resources on Quizplus 14 Chapters

1942 Verified Questions

1942 Flashcards

Source URL: https://quizplus.com/study-set/3390

Page 2

Chapter 1: Accounting Information Systems: An Overview

Available Study Resources on Quizplus for this Chatper

161 Verified Questions

161 Flashcards

Source URL: https://quizplus.com/quiz/67264

Sample Questions

Q1) Discuss the internal audit function within an organization.

Answer:

The internal audit function in an organization has evolved as a response to the need for and complexity of adequate internal control.The internal audit function is charged with monitoring and assessing compliance with organizational policies and procedures. The internal audit function can only be effective if it is treated as an independent appraisal activity within the organization.It should be placed at an organization level where it can function independently of other departments and organizational functions.In many organizations the director of internal auditing is found at the level of vice president.This placement attests to the importance of internal auditing,as well as the need for independence from other departments and functions.The internal audit function must be segregated from the accounting function,and it must not have responsibility or authority for any operating activities of the organization.

Q2) DBMS is the hands-on use of computers by end users.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Systems Techniques and Documentation

Available Study Resources on Quizplus for this Chatper

134 Verified Questions

134 Flashcards

Source URL: https://quizplus.com/quiz/67277

Sample Questions

Q1) Which of the following symbols should not be used to specify an input/output operation?

A) Decision symbol

B) Document symbol

C) Off-line storage symbol

D) Communication link

Answer: A

Q2) A systems development project generally consists of three main phases.

A)True

B)False

Answer: True

Q3) Instead of using the on-line storage symbol,a systems analyst wants to use an analytic flowcharting symbol that represents the medium that is used for the file.Which of the following would be the best symbol to use in place of the on-line analytic storage symbol?

A) The display symbol

B) The magnetic tape symbol

C) The document symbol

D) None of these answers are correct.

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Ebusiness and Ecommerce

Available Study Resources on Quizplus for this Chatper

119 Verified Questions

119 Flashcards

Source URL: https://quizplus.com/quiz/67276

Sample Questions

Q1) The technique of ________ permits bank to issue digital cash so that it is unable to link the payer to the payee.

Answer: blinding

Q2) The ________ architecture defines the needed data and how it is to be stored,processed,utilized,and integrated with other domains.

A) business

B) data

C) application

D) technical

Answer: B

Q3) Ben Black works as an instructor at Cheyenne School,whose domain name is Chey.Ben Black's user name is bblack.Cheyenne School's e-mail system uses the POP protocol.Ben Black's e-mail address is

A) bblack@chey.edu.

B) bblack@chey.com.

C) benblack@chey.org.

D) benblack@chey.com.

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: Transaction Processing and the Internal Control Process

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/67275

Sample Questions

Q1) A negative answer given to a question on an internal control questionnaire almost always indicates a weakness in an internal control process area.

A)True

B)False

Q2) Informal pressure from employees does not cause collusion.

A)True

B)False

Q3) What is corporate culture? Why might someone argue that the corporate culture has more influence over ethical behavior in a firm than the corporate ethics code of conduct?

Q4) The problems small businesses encounter with internal control that are addressed by COSO include the following except A) effective boards of directors.

B) limited segregation of duties and increased focus on monitoring.

C) compensating for limitations in information technology.

D) outsourcing increased reporting requirements.

Q5) Fraud examination draws on the fields of ________,________,and ________.

Page 6

Q6) In cases of ________,"the procedures did not fail,the people did."

Q7) The ________ budget is the budget for the entire organization.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Fraud Examination and Fraud Management

Available Study Resources on Quizplus for this Chatper

132 Verified Questions

132 Flashcards

Source URL: https://quizplus.com/quiz/67274

Sample Questions

Q1) Type 1 error occurs when a fraud indicator fails to signal fraud.

A)True

B)False

Q2) Fraud investigator should immediately present the suspect with a written confession to sign once an oral confession is obtained.

A)True

B)False

Q3) IP tracing is not a foolproof method.

A)True

B)False

Q4) Individuals who provide expert opinions and analyses to attorneys under the umbrella of attorney-client privilege are called ________ ________.

Q5) Type 2 errors result in unnecessary fraud investigations.

A)True

B)False

Q6) Describe procedures or activities that a company can implement to minimize financial statement fraud.

Q7) Pulling the plug can defeat certain ________ techniques sometimes used by sophisticated fraudsters.

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Information Systems Security

Available Study Resources on Quizplus for this Chatper

170 Verified Questions

170 Flashcards

Source URL: https://quizplus.com/quiz/67273

Sample Questions

Q1) Which of the following causes of disasters occurs less than any other cause?

A) Natural disasters

B) Human errors

C) Deliberate actions

D) Passive threats

Q2) Using the qualitative approach to risk assessment,each loss exposure is computed as the product of the cost of an individual loss times the likelihood of its occurrence.

A)True

B)False

Q3) The three objectives of information security include

A) confidentiality, integrity, and availability.

B) protection, responsibility, and continuity.

C) confidentiality, protection, and continuity.

D) responsibility, integrity, and availability.

Q4) In computer environments,________ control is especially important as there is often a tendency to either overspend or spend on the wrong things.

Q5) ________ involves running multiple operating systems or multiple copies of the same operating system on the same machine.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Electronic Data Processing Systems

Available Study Resources on Quizplus for this Chatper

126 Verified Questions

126 Flashcards

Source URL: https://quizplus.com/quiz/67272

Sample Questions

Q1) There are three major aspects to the operation of a computerized general ledger system.

A)True

B)False

Q2) The summary of the current month's general ledger activity is the general ledger by ________.

Q3) Comparing the activity file and the bank summary file does not ensure that all cash has been deposited and has been applied and recorded on the activity file.

A)True

B)False

Q4) A transmission acknowledgment reports in detail the items in the received message.

A)True

B)False

Q5) A functional acknowledgment acknowledges receipt of the message and reports in detail the items in the received message.

A)True

B)False

Q6) Describe how random-access file updating differs from sequential file updating.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Revenue Cycle Processes

Available Study Resources on Quizplus for this Chatper

125 Verified Questions

125 Flashcards

Source URL: https://quizplus.com/quiz/67271

Sample Questions

Q1) In the shipping step of the customer order business management process,the ERP may recheck the availability of goods to ensure that delivery is immediately possible.

A)True

B)False

Q2) To provide an adequate separation of functions in the accounts receivable business process,maintaining the accounts receivable control account should be the responsibility of

A) billing.

B) accounts receivable.

C) cash receipts.

D) general ledger.

Q3) A warehouse employee uses a document to fulfill a customer order.The employee is most likely using a A) picking list.

B) packing list.

C) bill of lading.

D) shipping advice.

Q4) The distinction between ________ and ________ ________ is important to maintain separation of functions.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Procurement and Human Resources Business

Processes

Available Study Resources on Quizplus for this Chatper

118 Verified Questions

118 Flashcards

Source URL: https://quizplus.com/quiz/67270

Sample Questions

Q1) For compliance with SOX,assessed risk for business processes must be clearly A) tested and reported to FASB.

B) documented on form Circular E and submitted to the SEC.

C) tested and checked for material irregularities.

D) documented and controls selected for testing and evaluation.

Q2) In the SAP ERP system,an outline agreement with a vendor is basically a A) request for a quotation.

B) contract.

C) purchase order.

D) purchase requisition.

Q3) In ERP,human resource object types are identified with a one or two letter identifier.The code for the object Employee is A) E.

B) EE.

C) P.

D) W.

Q4) An outline agreement contains line items.

A)True

B)False

11

Q5) The SAP ERP HR object code for the object Job is ________.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: The Production Business Process

Available Study Resources on Quizplus for this Chatper

127 Verified Questions

127 Flashcards

Source URL: https://quizplus.com/quiz/67269

Sample Questions

Q1) A document detailing the work completed on individual orders as they move through the manufacturing process is the ________ ________ report.

Q2) In MRP II,batch size is determined from the production-planning module.

A)True

B)False

Q3) Inventories serve as a buffer between different operations in a

A) just-in-time production system.

B) materials as needed system.

C) perpetual inventory system.

D) Answers A and B are correct.

Q4) A manufacturing company wants to know the optimal amount to order of part number 45612.It should gather appropriate inventory information about the part and then calculate the part's

A) inventory usage rate.

B) lead time.

C) economic order quantity.

D) reorder point.

Q5) Systems ________ is "mission critical" in quick response manufacturing systems.

Q6) ________ ________ scanners require a direct line of sight in order to function.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Systems Planning, analysis, and Design

Available Study Resources on Quizplus for this Chatper

161 Verified Questions

161 Flashcards

Source URL: https://quizplus.com/quiz/67268

Sample Questions

Q1) What are the differences between logical flow diagrams and analytic flowcharts?

Q2) An iterative approach using prototypes is called

A) service-oriented development.

B) waterfall development.

C) object-oriented design.

D) rapid application development.

Q3) Certain turnkey software packages can sometimes meet the specific needs of an individual situation with minimal design work.Which of the following companies would least likely be able to use a turnkey system?

A) A doctor's office

B) An attorney

C) A petroleum refining company

D) A construction company

Q4) A good approach to use with a manager when performing an information needs analysis is to ask the manager,"What kind of problems do you have here?"

A)True

B)False

Q5) In OO,objects are said to possess ________ and ________.

Q6) ________ are the things objects do and ________ are the data related to objects.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Systems Project Management, implementation, operation, control

Available Study Resources on Quizplus for this Chatper

133 Verified Questions

133 Flashcards

Source URL: https://quizplus.com/quiz/67267

Sample Questions

Q1) The appropriate level of detail to be obtained from a project accounting system is generally decided by the chief information officer.

A)True

B)False

Q2) In service-oriented architecture (SOA),an important part of the application development framework is the business process execution language (BPEL)service engine.

A)True

B)False

Q3) The development of computer software without ________ is an almost worthless exercise.

Q4) In the design and implementation of a system,it is almost always necessary to do additional work during the ________ phase.

Q5) The task completion schedule,based on task time estimates,should be maintained without revision if at all possible.

A)True

B)False

Q6) What are some of the reasons why time estimates are often inaccurate?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Q7) ________ ________ should be submitted to the steering committee in writing.

Chapter 13: Data Management Concepts

Available Study Resources on Quizplus for this Chatper

143 Verified Questions

143 Flashcards

Source URL: https://quizplus.com/quiz/67266

Sample

Questions

Q1) Describe how list organization and multilist organization work in tree and network databases.Also,distinguish between a list structure and a ring structure in the implementation of tree and network structures.How does the list organization make database maintenance difficult? Under what circumstances is the list organization effective?

Q2) A database alias can also arise because the same data item is called different things in different programs written in different languages. A)True

B)False

Q3) ________ fields cross-link segments in tree and network database structures.

Q4) The database structure which allows a child segment to have more than one parent is the A) network. B) sequential.

C) tree.

D) object.

Q5) A database together with database software is database agnosticity. A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Auditing Information Technology

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/67265

Sample Questions

Q1) An audit of the computer service center is undertaken before any application audits to ensure the ________ ________ of the environment in which the application will function.

Q2) Which of the following controls would not be examined in the audit of a computer service center?

A) Environmental controls

B) Physical security controls

C) Management controls

D) Process application controls

Q3) Some embedded audit routines use automated collection language (ACL)to embed specially programmed modules as in-line code with regular programs.

A)True

B)False

Q4) An audit program is a detailed list of the audit procedures to be applied on a particular audit.

A)True

B)False

Q5) Why are most audits now performed by auditing through and with the computer?

Q6) In RBA,the subject of the audit is how well the management manages ________.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Turn static files into dynamic content formats.

Create a flipbook