Computerized Accounting Pre-Test Questions - 2238 Verified Questions

Page 1


Computerized Accounting Pre-Test

Questions

Course Introduction

Computerized Accounting introduces students to the fundamentals of using accounting software to record, process, and manage financial transactions. The course covers essential concepts such as the setup and management of electronic accounting systems, maintenance of journals and ledgers, financial statement generation, payroll processing, and internal controls. Through hands-on practice with popular accounting software, students will develop practical skills in automating business accounting processes, improving accuracy, and enhancing efficiency in financial reporting, preparing them for the contemporary business environment.

Recommended Textbook Accounting Information Systems 14th Edition by Marshall B. Romney

Available Study Resources on Quizplus

22 Chapters

2238 Verified Questions

2238 Flashcards

Source URL: https://quizplus.com/study-set/3303

Page 2

Chapter 1: Conceptual Foundations of Accounting Information Systems

Available Study Resources on Quizplus for this Chatper

115 Verified Questions

115 Flashcards

Source URL: https://quizplus.com/quiz/65544

Sample Questions

Q1) How can a well-designed AIS improve the efficiency and effectiveness of a company's value chain?

Answer: The AIS can be designed to allow customers direct access to a company's inventory and sales order entry systems.This allows the customer to do more of the work that traditionally has been done by sales,marketing,and administration personnel.This allows for faster ordering,and cuts the company's labor costs.It may also have the effect of allowing the customer more control in a purchase transaction that may bring more satisfaction and value to the customer.

Q2) Why have accounting software packages been designed with separate transaction modules?

Answer: Since every organization does not necessarily use all of the transaction cycles in its operations,it is to the advantage of the organization to be able to "pick and choose" from among various software modules that track and record different transaction cycles.For example,a law firm would have no need to implement a production cycle module.Also,the nature of a transaction cycle varies across the broad spectrum of business organizations.Again,a law firm would have a revenue cycle,but it would not involve the purchase,receipt,and payment for products or merchandise;likewise a retail store chain may not sell any consulting services to its customers.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Overview of Transaction Processing and Enterprise Resource Planning Systems

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/65533

Sample Questions

Q1) The Cape Fear Rocket Club heads out to the dunes of Cape Fear,Oregon every August to pierce the sky with their fiery projectiles.An enterprising seller of t-shirts has devised a series of designs that capture the spirit of the event in silk-screened splendor.His employees can be found on many of the major intersections selling his products out of the backs of pickup trucks.What is the best way for this business to ensure that sales data entry is efficient and accurate?

A)well-designed paper forms

B)source data automation

C)turnaround documents

D)sequentially numbered forms

Answer: D

Q2) Which step below is not considered to be part of the data processing cycle?

A)data input

B)feedback from external sources

C)data storage

D)data processing

Answer: B

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Systems Documentation Techniques

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/65529

Sample Questions

Q1) In a DFD,a "bubbles" is also known as a A)data store.

B)transformation process.

C)data flow.

D)data destination.

Answer: B

Q2) Nancy Kempf has been hired by Andersen Manufacturing as a staff accountant in the internal audit department.She has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements.She decides to begin by meeting with the information technology staff in order to develop an understanding of the computer programs used by the system.The documentation tool that he should employ for this purpose is a A)data flow diagram.

B)document flowchart.

C)system flowchart.

D)program flowchart.

Answer: D

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Relational Databases

Available Study Resources on Quizplus for this Chatper

113 Verified Questions

113 Flashcards

Source URL: https://quizplus.com/quiz/65528

Sample Questions

Q1) Record layouts,definitions,addresses,and indexes will be stored at the ________ level schema.

A)external

B)conceptual

C)internal

D)meta

Q2) Inability to add new data to a database without violating the basic integrity of the database is referred to as the

A)update anomaly.

B)insert anomaly.

C)integrity anomaly.

D)delete anomaly.

Q3) Data dictionary can be used as part of the audit trail.

A)True

B)False

Q4) Identify one potential outcome of the insert anomaly.

A)inconsistent data

B)inability to add new data

C)unintentional loss of data

D)none of the above

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Computer Fraud

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/65527

Sample Questions

Q1) Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except

A)Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience.

B)Jamie has suffered a substantial loss in her investment because of Lauren's deception. C)Jamie trusted and relied on Lauren's representation of the business financial operation.

D)Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis.

Q2) Describe some of the most frequent fraudulent financial reporting schemes.

Q3) Explain the various computer fraud classifications using the data processing model.Provide an example for each computer fraud classification.

To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 6: Computer Fraud and Abuse Techniques

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/65526

Sample Questions

Q1) Using special software to bypass system controls and perform illegal acts is called A)superzapping.

B)tabnapping.

C)pretexting.

D)piggybacking.

Q2) On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in A)snarfing.

B)Wi-pilfering.

C)war driving.

D)data slurping.

Q3) Acting under false pretenses to gain confidential information is called A)superzapping.

B)tabnapping.

C)pretexting.

D)piggybacking.

Q4) Describe ways to help minimize social engineering.

Q5) Describe the differences between spyware,scareware,and ransomware.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Control and Accounting Information Systems

Available Study Resources on Quizplus for this Chatper

132 Verified Questions

132 Flashcards

Source URL: https://quizplus.com/quiz/65525

Sample Questions

Q1) The principle of obtaining or generating relevant,high-quality information to support internal control belongs to which of the COSO's Internal Control Model's component?

A)Control environment.

B)Risk assessment.

C)Control activities.

D)Information and communication.

Q2) An accounting policy that requires a purchasing manager to sign off on all purchases over $10,000 is an example of

A)general authorization.

B)specific authorization.

C)special authorization.

D)generic authorization.

Q3) A neural network is a software program that has

A)the ability to read text.

B)the ability to learn.

C)the capability to extract information from an individual's brain.

D)the capability to inject information into an individual's brain.

Q4) Explain how a company could safeguard its assets,records,and data.

Q5) Describe the differences between general and specific authorization.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Controls for Information Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/65524

Sample Questions

Q1) Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?

A)Evaluate and modify the system using COBOL.

B)Evaluate and modify the system using the CTC checklist.

C)Evaluate and modify the system using the Trust Services framework

D)Evaluate and modify the system using the COSO Internal Control Framework.

Q2) Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.

A)IDS

B)TCP/IP

C)MAC

D)DMZ

To view all questions and flashcards with answers, click on the resource link above.

Page 10

Chapter 9: Confidentiality and Privacy Controls

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/65523

Sample Questions

Q1) Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals' privacy.

A)The Health Insurance Portability and Accountability Act (HIPAA).

B)The Health Information Technology for Economic and Clinical Health Act (HITECH).

C)The Gramm--Leach--Bliley Act.

D)The Dodd-Frank Act.

Q2) An electronic document that certifies the identity of the owner of a particular public key.

A)Asymmetric encryption.

B)Digital certificate.

C)Digital signature.

D)Public key.

Q3) A process that takes plaintext of any length and transforms it into a short code is called

A)asymmetric encryption.

B)encryption.

C)hashing.

D)symmetric encryption.

To view all questions and flashcards with answers, click on the resource link above.

11

Chapter 10: Processing Integrity and Availability Controls

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/65543

Sample Questions

Q1) The maximum amount of time between backups is determined by a company's

A)recovery time objective.

B)recovery point objective.

C)recovery objective.

D)maximum time recovery objective.

Q2) The control that verifies accuracy by comparing two alternative ways of calculating the same total is called

A)concurrent update controls.

B)cross-footing balance test.

C)data conversion controls.

D)recalculation of batch totals.

Q3) A ________ determines if all required data items have been entered.

A)completeness check

B)field check

C)limit check

D)range check

Q4) Discuss ways that can help ensure the processing integrity of electronic voting.

Q5) Best practice requires backups be retained indefinitely.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Auditing Computer-Based Information Systems

Available Study Resources on Quizplus for this Chatper

116 Verified Questions

116 Flashcards

Source URL: https://quizplus.com/quiz/65542

Sample Questions

Q1) The information systems audit objective that pertains to having management's authorization and approval is known as

A)overall security.

B)program development.

C)program modifications.

D)processing.

Q2) A type of software that auditors can use to analyze program logic and detect unexecuted program code is

A)an audit log.

B)a mapping program.

C)a scanning routine.

D)program tracing.

Q3) Strong ________ controls can partially compensate for inadequate ________ controls.

A)development;processing

B)processing;development

C)operational;internal

D)internal;operational

Q4) Name and describe the different types of audits.

Q5) Describe how audit evidence can be collected.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: The Revenue Cycle: Sales to Cash Collections

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/65541

Sample Questions

Q1) The least effective control for preventing an organization from processing fraudulent credit memo is to

A)match each credit memo with a receiving report.

B)require approval for each credit memo by the credit manager.

C)reconcile total of credit memos to total debits posted to customers' subsidiary ledgers.

D)sequentially prenumber all credit memos and perform a sequence check at the end of each day.

Q2) Consider the following revenue cycle scenario: The company has been exposed to customer dissatisfaction and the suggested control procedure to be implemented is to install and use bar-code scanners.What is the threat?

A)The company may be shipping the wrong merchandise.

B)The company may be shipping the wrong quantities of merchandise.

C)The company may be shipping orders to the wrong address.

D)All of the above threats may apply to this scenario.

Q3) Describe the basic revenue cycle activities.

Q4) Define and describe benefits of a CRM system.

Q5) Explain how to effectively segregate duties in the sales order activity.

Q6) Discuss the revenue cycle threat of stockouts,carrying costs,and markdowns.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: The Expenditure Cycle: Purchasing to Cash

Disbursements

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/65540

Sample Questions

Q1) Identify ten threats and applicable control procedures in the expenditure cycle.

Q2) One objective of accounts payable is to authorize payment only for goods or services actually ordered and received.The best way to process supplier invoices is to use

A)electronic funds transfer for small,occasional purchases from suppliers.

B)a nonvoucher system.

C)EDI for all small,occasional purchases from suppliers.

D)a disbursement voucher system.

Q3) It is important to physically count inventory,at least periodically,even in a perpetual inventory system.

A)True

B)False

Q4) What types of decision-making and strategic information should the AIS provide in the expenditure cycle?

Q5) Identify possible problems associated with receiving goods and appropriate actions in response to the problems.

Q6) Describe the function of an imprest fund.

Page 15

Q7) In the expenditure cycle,the majority of payments made are by check.What are some control issues related to payment of vendors by check?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: The Production Cycle

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/65539

Sample Questions

Q1) The ________ authorizes the transfer of raw materials from the storeroom to the production floor.

A)bill of materials

B)production order

C)materials requisition

D)move ticket

Q2) What is PLM and how management can use it to improve product design?

Q3) What is the main difference between MRP-II and JIT manufacturing systems?

A)The length of the planning horizon

B)JIT uses long-term customer demand for planning purposes,but MRP-II uses short-term customer demand for planning purposes.

C)MRP-II relies on EDI,but JIT does not.

D)There are no significant differences between MRP-II and JIT.

Q4) ________ are associated with testing to ensure that products meet quality standards.

A)External failure costs

B)Inspection costs

C)Internal failure costs

D)Prevention costs

Q5) Discuss the criticisms of traditional cost accounting methods.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: The Human Resources Management and Payroll Cycle

Available Study Resources on Quizplus for this Chatper

86 Verified Questions

86 Flashcards

Source URL: https://quizplus.com/quiz/65538

Sample Questions

Q1) The HRM department should immediately delete records of employees who quit to prevent other employees from assuming their identities.

A)True

B)False

Q2) Describe benefits and threats of incentive and bonus programs.

Q3) Using financial incentives requires organizations to

A)pay employees less than they would have to if pay was a fixed salary.

B)better monitor employee attendance.

C)link the payroll system to other cycles to calculate incentive payments.

D)better monitor employee effort.

Q4) Which of the following controls can minimize the threat of hiring unqualified or larcenous employees?

A)Redepositing unclaimed paychecks and investigating cause.

B)Issuing earnings statements to employees.

C)Using biometric authentication.

D)Conducting criminal background investigation checks of all applicants for finance related positions.

Q5) Discuss the threat of unauthorized changes to the payroll master file and its consequences.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: General Ledger and Reporting System

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/65537

Sample Questions

Q1) Which of the following balanced scorecard dimensions provides measures on how well the organization is working to improve customer satisfaction and become the preferred supplier for key customers?

A)Financial.

B)Internal operations.

C)Innovation and learning.

D)Customer.

Q2) IFRS stands for

A)International Financial Reporting Standards.

B)International Forensic Response System.

C)International and Financial Reporting Statements.

D)International Financial Recovery System.

Q3) Corrections are entries made to correct errors found in A)all journals.

B)special journals.

C)the general ledger.

D)the financial statements.

Q4) Explain the benefits of XBRL.

Q5) How is a balanced scorecard used to assess organizational performance?

Q6) Discuss the value and role of budgets as managerial reports.

Page 18

To view all questions and flashcards with answers, click on the resource link above.

Chapter 17: Database Design Using the Rea Data Model

Available Study Resources on Quizplus for this Chatper

90 Verified Questions

90 Flashcards

Source URL: https://quizplus.com/quiz/65536

Sample Questions

Q1) Describe what is a E-R diagram and provide an example.

Q2) Explain why users should participate in data modeling?

Q3) E-R diagrams can be used to represent the contents of any kind of database.

A)True

B)False

Q4) Define cardinality.

Q5) In which stage(s)of the database design process should accountants participate?

A)the systems analysis stage

B)the conceptual design stage

C)the implementation and conversion stage

D)in all of the stages above

Q6) Identify the item below that would be classified as an agent by the REA data model.

A)An IOU from a customer.

B)The customer.

C)A customer sale.

D)A loan from a vendor.

Q7) What is Cardinalities?

Q8) Explain how an AIS system can be viewed as a set of "give-to-get" exchanges.

Q9) Describe data modeling.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Implementing an Rea Model in a Relational Database

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/65535

Sample Questions

Q1) Rebus Fashions provides haircuts to men and women.Rebus uses an REA database to record information that is important to the firm.Rebus has an M:N table named "Customer-Sale" where it keeps information about customer sales.Identify the attribute below that most likely does not belong in the Customer-Sale table.

A)Date of sale.

B)Time hair cut was started.

C)Name of customer.

D)All of the above are appropriate attributes for the Customer table.

Q2) When combining two REA diagrams by merging common entities,changes in the cardinality of the merged entity is needed when it is a(n) A)agent.

B)event.

C)relationship.

D)resource.

Q3) In an integrated REA diagram,every resource must be linked to A)at least two events.

B)at least two agents.

C)at least one other resource.

D)at least two other resources.

Page 20

To view all questions and flashcards with answers, click on the resource link above.

Chapter 19: Special Topics in Rea Modeling

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/65534

Sample Questions

Q1) Why might an REA diagram show relationships between resources and agents?

Q2) Using an REA database design,which is the most likely primary key for the Pay for Goods table?

A)Cash transaction number.

B)Check number.

C)Invoice number.

D)Receiving report number.

Q3) Employees and Training entities is ________ ,because a given employee will,over time,attend numerous training courses and,conversely,several employees may attend the same specific training class.

A)1:1

B)1:N

C)M:N

D)1:M

Q4) In which entity would an item's standard cost information most likely be maintained?

A)Inventory entity.

B)Order_Inventory entity.

C)Inventory-Order_Inventory entity.

D)Cost entity.

21

To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Introduction to Systems Development and Systems Analysis

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/65532

Sample Questions

Q1) Discuss the relative advantages and disadvantages of the four different methods for gathering data during a systems survey.

Q2) The least time-consuming method of collecting data for use in a systems survey is A)observation.

B)interviews.

C)questionnaires.

D)reviewing system documentation.

Q3) The system objective concerned that information output should help management and users make decisions is known as A)flexibility.

B)reliability.

C)timeliness.

D)usefulness.

Q4) When seeking to describes how a system should work,the most useful approach is to

A)conduct interviews.

B)make observations.

C)distribute questionnaires.

D)read system documentation.

To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Ais Development Strategies

Available Study Resources on Quizplus for this Chatper

117 Verified Questions

117 Flashcards

Source URL: https://quizplus.com/quiz/65531

Sample Questions

Q1) Who is typically responsible for installing turnkey systems?

A)An organization's IT department.

B)The vendor who provides the system.

C)A third-party hired by the system vendor.

D)Both the organization's IT department and the vendor who provides the system.

Q2) RFPs for exact hardware and software specifications have higher total costs and require more time to prepare and evaluate.

A)True

B)False

Q3) The risk of losing a fundamental understanding of a company's AIS needs and the strategic users of an AIS as a result of outsourcing is referred to as A)focus reduction.

B)loss of control.

C)reduced competitive advantage.

D)unfulfilled goals.

Q4) Explain the concept of an application service provider.

Q5) Describe the important characteristics of extreme programming (XP).

Q6) What guidelines should be followed when contracting with an outside developer to create custom software?

Page 23

To view all questions and flashcards with answers, click on the resource link above.

Chapter 22: Systems Design, implementation, and Operation

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/65530

Sample Questions

Q1) Which element of design specification will help the project team find an efficient way to collect data for preparing sales reports?

A)Data collection.

B)Input.

C)Output.

D)Processing procedures.

Q2) Employees who are transferred internally is often a more costly alternative because they already will need to be trained.

A)True

B)False

Q3) Which of the following control considerations will help ensure that all input,processing,storage,and output activities are authorized by the appropriate managers?

A)Security.

B)Accuracy.

C)Authorization.

D)Validity.

Q4) What is the objective of output design? What are the output design considerations? What are the various categories of outputs?

To view all questions and flashcards with answers, click on the resource link above. Page 24

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Computerized Accounting Pre-Test Questions - 2238 Verified Questions by Quizplus - Issuu