

Computerized Accounting Pre-Test
Questions
Course Introduction
Computerized Accounting introduces students to the fundamentals of using accounting software to record, process, and manage financial transactions. The course covers essential concepts such as the setup and management of electronic accounting systems, maintenance of journals and ledgers, financial statement generation, payroll processing, and internal controls. Through hands-on practice with popular accounting software, students will develop practical skills in automating business accounting processes, improving accuracy, and enhancing efficiency in financial reporting, preparing them for the contemporary business environment.
Recommended Textbook Accounting Information Systems 14th Edition by Marshall B. Romney
Available Study Resources on Quizplus
22 Chapters
2238 Verified Questions
2238 Flashcards
Source URL: https://quizplus.com/study-set/3303

Page 2

Chapter 1: Conceptual Foundations of Accounting Information Systems
Available Study Resources on Quizplus for this Chatper
115 Verified Questions
115 Flashcards
Source URL: https://quizplus.com/quiz/65544
Sample Questions
Q1) How can a well-designed AIS improve the efficiency and effectiveness of a company's value chain?
Answer: The AIS can be designed to allow customers direct access to a company's inventory and sales order entry systems.This allows the customer to do more of the work that traditionally has been done by sales,marketing,and administration personnel.This allows for faster ordering,and cuts the company's labor costs.It may also have the effect of allowing the customer more control in a purchase transaction that may bring more satisfaction and value to the customer.
Q2) Why have accounting software packages been designed with separate transaction modules?
Answer: Since every organization does not necessarily use all of the transaction cycles in its operations,it is to the advantage of the organization to be able to "pick and choose" from among various software modules that track and record different transaction cycles.For example,a law firm would have no need to implement a production cycle module.Also,the nature of a transaction cycle varies across the broad spectrum of business organizations.Again,a law firm would have a revenue cycle,but it would not involve the purchase,receipt,and payment for products or merchandise;likewise a retail store chain may not sell any consulting services to its customers.
To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Available Study Resources on Quizplus for this Chatper
107 Verified Questions
107 Flashcards
Source URL: https://quizplus.com/quiz/65533
Sample Questions
Q1) The Cape Fear Rocket Club heads out to the dunes of Cape Fear,Oregon every August to pierce the sky with their fiery projectiles.An enterprising seller of t-shirts has devised a series of designs that capture the spirit of the event in silk-screened splendor.His employees can be found on many of the major intersections selling his products out of the backs of pickup trucks.What is the best way for this business to ensure that sales data entry is efficient and accurate?
A)well-designed paper forms
B)source data automation
C)turnaround documents
D)sequentially numbered forms
Answer: D
Q2) Which step below is not considered to be part of the data processing cycle?
A)data input
B)feedback from external sources
C)data storage
D)data processing
Answer: B
To view all questions and flashcards with answers, click on the resource link above. Page 4
Chapter 3: Systems Documentation Techniques
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/65529
Sample Questions
Q1) In a DFD,a "bubbles" is also known as a A)data store.
B)transformation process.
C)data flow.
D)data destination.
Answer: B
Q2) Nancy Kempf has been hired by Andersen Manufacturing as a staff accountant in the internal audit department.She has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements.She decides to begin by meeting with the information technology staff in order to develop an understanding of the computer programs used by the system.The documentation tool that he should employ for this purpose is a A)data flow diagram.
B)document flowchart.
C)system flowchart.
D)program flowchart.
Answer: D
To view all questions and flashcards with answers, click on the resource link above.

Page 5
Chapter 4: Relational Databases
Available Study Resources on Quizplus for this Chatper
113 Verified Questions
113 Flashcards
Source URL: https://quizplus.com/quiz/65528
Sample Questions
Q1) Record layouts,definitions,addresses,and indexes will be stored at the ________ level schema.
A)external
B)conceptual
C)internal
D)meta
Q2) Inability to add new data to a database without violating the basic integrity of the database is referred to as the
A)update anomaly.
B)insert anomaly.
C)integrity anomaly.
D)delete anomaly.
Q3) Data dictionary can be used as part of the audit trail.
A)True
B)False
Q4) Identify one potential outcome of the insert anomaly.
A)inconsistent data
B)inability to add new data
C)unintentional loss of data
D)none of the above

Page 6
To view all questions and flashcards with answers, click on the resource link above.
Chapter 5: Computer Fraud
Available Study Resources on Quizplus for this Chatper
83 Verified Questions
83 Flashcards
Source URL: https://quizplus.com/quiz/65527
Sample Questions
Q1) Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except
A)Jamie's decision to invest was primarily based on Lauren's assertion that she had prior floral retail experience.
B)Jamie has suffered a substantial loss in her investment because of Lauren's deception. C)Jamie trusted and relied on Lauren's representation of the business financial operation.
D)Jamie found Lauren dishonest because she does not always reconcile the business cash account on a timely basis.
Q2) Describe some of the most frequent fraudulent financial reporting schemes.
Q3) Explain the various computer fraud classifications using the data processing model.Provide an example for each computer fraud classification.
To view all questions and flashcards with answers, click on the resource link above.

Page 7

Chapter 6: Computer Fraud and Abuse Techniques
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/65526
Sample Questions
Q1) Using special software to bypass system controls and perform illegal acts is called A)superzapping.
B)tabnapping.
C)pretexting.
D)piggybacking.
Q2) On the weekends,Mary Andersen climbs into her Toyota Camry and drives around the city of Las Vegas looking for unprotected wireless networks to exploit.Mary is most likely engaging in A)snarfing.
B)Wi-pilfering.
C)war driving.
D)data slurping.
Q3) Acting under false pretenses to gain confidential information is called A)superzapping.
B)tabnapping.
C)pretexting.
D)piggybacking.
Q4) Describe ways to help minimize social engineering.
Q5) Describe the differences between spyware,scareware,and ransomware.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Control and Accounting Information Systems
Available Study Resources on Quizplus for this Chatper
132 Verified Questions
132 Flashcards
Source URL: https://quizplus.com/quiz/65525
Sample Questions
Q1) The principle of obtaining or generating relevant,high-quality information to support internal control belongs to which of the COSO's Internal Control Model's component?
A)Control environment.
B)Risk assessment.
C)Control activities.
D)Information and communication.
Q2) An accounting policy that requires a purchasing manager to sign off on all purchases over $10,000 is an example of
A)general authorization.
B)specific authorization.
C)special authorization.
D)generic authorization.
Q3) A neural network is a software program that has
A)the ability to read text.
B)the ability to learn.
C)the capability to extract information from an individual's brain.
D)the capability to inject information into an individual's brain.
Q4) Explain how a company could safeguard its assets,records,and data.
Q5) Describe the differences between general and specific authorization.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Controls for Information Security
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/65524
Sample Questions
Q1) Kuzman Jovan called a meeting of the top management at Jovan Capital Management.Number one on the agenda was computer system security."The risk of security breach incidents has become unacceptable," he said,and turned to the Chief Information Officer."What do you intend to do?" Which of the following is the best answer?
A)Evaluate and modify the system using COBOL.
B)Evaluate and modify the system using the CTC checklist.
C)Evaluate and modify the system using the Trust Services framework
D)Evaluate and modify the system using the COSO Internal Control Framework.
Q2) Residents in Berryhill received an e-mail stating that there is an armed robber on the loose.The e-mail claimed to be from the Berryhill police department,but it wasn't.Computer forensic experts later determined that the e-mail was sent from a computer lab in the Berryhill's public library.The police were then able to uniquely identify the computer that was used by means of its network interface card's ________ address.Security cameras later help the police to reveal the identity of the individual responsible for the hoax.
A)IDS
B)TCP/IP
C)MAC
D)DMZ
To view all questions and flashcards with answers, click on the resource link above.
Page 10

Chapter 9: Confidentiality and Privacy Controls
Available Study Resources on Quizplus for this Chatper
61 Verified Questions
61 Flashcards
Source URL: https://quizplus.com/quiz/65523
Sample Questions
Q1) Identify the item below which is not a piece of legislation passed to protect individuals against identity theft or to secure individuals' privacy.
A)The Health Insurance Portability and Accountability Act (HIPAA).
B)The Health Information Technology for Economic and Clinical Health Act (HITECH).
C)The Gramm--Leach--Bliley Act.
D)The Dodd-Frank Act.
Q2) An electronic document that certifies the identity of the owner of a particular public key.
A)Asymmetric encryption.
B)Digital certificate.
C)Digital signature.
D)Public key.
Q3) A process that takes plaintext of any length and transforms it into a short code is called
A)asymmetric encryption.
B)encryption.
C)hashing.
D)symmetric encryption.
To view all questions and flashcards with answers, click on the resource link above.
11

Chapter 10: Processing Integrity and Availability Controls
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/65543
Sample Questions
Q1) The maximum amount of time between backups is determined by a company's
A)recovery time objective.
B)recovery point objective.
C)recovery objective.
D)maximum time recovery objective.
Q2) The control that verifies accuracy by comparing two alternative ways of calculating the same total is called
A)concurrent update controls.
B)cross-footing balance test.
C)data conversion controls.
D)recalculation of batch totals.
Q3) A ________ determines if all required data items have been entered.
A)completeness check
B)field check
C)limit check
D)range check
Q4) Discuss ways that can help ensure the processing integrity of electronic voting.
Q5) Best practice requires backups be retained indefinitely.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Auditing Computer-Based Information Systems
Available Study Resources on Quizplus for this Chatper
116 Verified Questions
116 Flashcards
Source URL: https://quizplus.com/quiz/65542
Sample Questions
Q1) The information systems audit objective that pertains to having management's authorization and approval is known as
A)overall security.
B)program development.
C)program modifications.
D)processing.
Q2) A type of software that auditors can use to analyze program logic and detect unexecuted program code is
A)an audit log.
B)a mapping program.
C)a scanning routine.
D)program tracing.
Q3) Strong ________ controls can partially compensate for inadequate ________ controls.
A)development;processing
B)processing;development
C)operational;internal
D)internal;operational
Q4) Name and describe the different types of audits.
Q5) Describe how audit evidence can be collected.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: The Revenue Cycle: Sales to Cash Collections
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/65541
Sample Questions
Q1) The least effective control for preventing an organization from processing fraudulent credit memo is to
A)match each credit memo with a receiving report.
B)require approval for each credit memo by the credit manager.
C)reconcile total of credit memos to total debits posted to customers' subsidiary ledgers.
D)sequentially prenumber all credit memos and perform a sequence check at the end of each day.
Q2) Consider the following revenue cycle scenario: The company has been exposed to customer dissatisfaction and the suggested control procedure to be implemented is to install and use bar-code scanners.What is the threat?
A)The company may be shipping the wrong merchandise.
B)The company may be shipping the wrong quantities of merchandise.
C)The company may be shipping orders to the wrong address.
D)All of the above threats may apply to this scenario.
Q3) Describe the basic revenue cycle activities.
Q4) Define and describe benefits of a CRM system.
Q5) Explain how to effectively segregate duties in the sales order activity.
Q6) Discuss the revenue cycle threat of stockouts,carrying costs,and markdowns.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: The Expenditure Cycle: Purchasing to Cash
Disbursements
Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/65540
Sample Questions
Q1) Identify ten threats and applicable control procedures in the expenditure cycle.
Q2) One objective of accounts payable is to authorize payment only for goods or services actually ordered and received.The best way to process supplier invoices is to use
A)electronic funds transfer for small,occasional purchases from suppliers.
B)a nonvoucher system.
C)EDI for all small,occasional purchases from suppliers.
D)a disbursement voucher system.
Q3) It is important to physically count inventory,at least periodically,even in a perpetual inventory system.
A)True
B)False
Q4) What types of decision-making and strategic information should the AIS provide in the expenditure cycle?
Q5) Identify possible problems associated with receiving goods and appropriate actions in response to the problems.
Q6) Describe the function of an imprest fund.
Page 15
Q7) In the expenditure cycle,the majority of payments made are by check.What are some control issues related to payment of vendors by check?
To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: The Production Cycle
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/65539
Sample Questions
Q1) The ________ authorizes the transfer of raw materials from the storeroom to the production floor.
A)bill of materials
B)production order
C)materials requisition
D)move ticket
Q2) What is PLM and how management can use it to improve product design?
Q3) What is the main difference between MRP-II and JIT manufacturing systems?
A)The length of the planning horizon
B)JIT uses long-term customer demand for planning purposes,but MRP-II uses short-term customer demand for planning purposes.
C)MRP-II relies on EDI,but JIT does not.
D)There are no significant differences between MRP-II and JIT.
Q4) ________ are associated with testing to ensure that products meet quality standards.
A)External failure costs
B)Inspection costs
C)Internal failure costs
D)Prevention costs
Q5) Discuss the criticisms of traditional cost accounting methods.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: The Human Resources Management and Payroll Cycle
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/65538
Sample Questions
Q1) The HRM department should immediately delete records of employees who quit to prevent other employees from assuming their identities.
A)True
B)False
Q2) Describe benefits and threats of incentive and bonus programs.
Q3) Using financial incentives requires organizations to
A)pay employees less than they would have to if pay was a fixed salary.
B)better monitor employee attendance.
C)link the payroll system to other cycles to calculate incentive payments.
D)better monitor employee effort.
Q4) Which of the following controls can minimize the threat of hiring unqualified or larcenous employees?
A)Redepositing unclaimed paychecks and investigating cause.
B)Issuing earnings statements to employees.
C)Using biometric authentication.
D)Conducting criminal background investigation checks of all applicants for finance related positions.
Q5) Discuss the threat of unauthorized changes to the payroll master file and its consequences.
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: General Ledger and Reporting System
Available Study Resources on Quizplus for this Chatper
83 Verified Questions
83 Flashcards
Source URL: https://quizplus.com/quiz/65537
Sample Questions
Q1) Which of the following balanced scorecard dimensions provides measures on how well the organization is working to improve customer satisfaction and become the preferred supplier for key customers?
A)Financial.
B)Internal operations.
C)Innovation and learning.
D)Customer.
Q2) IFRS stands for
A)International Financial Reporting Standards.
B)International Forensic Response System.
C)International and Financial Reporting Statements.
D)International Financial Recovery System.
Q3) Corrections are entries made to correct errors found in A)all journals.
B)special journals.
C)the general ledger.
D)the financial statements.
Q4) Explain the benefits of XBRL.
Q5) How is a balanced scorecard used to assess organizational performance?
Q6) Discuss the value and role of budgets as managerial reports.
Page 18
To view all questions and flashcards with answers, click on the resource link above.

Chapter 17: Database Design Using the Rea Data Model
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/65536
Sample Questions
Q1) Describe what is a E-R diagram and provide an example.
Q2) Explain why users should participate in data modeling?
Q3) E-R diagrams can be used to represent the contents of any kind of database.
A)True
B)False
Q4) Define cardinality.
Q5) In which stage(s)of the database design process should accountants participate?
A)the systems analysis stage
B)the conceptual design stage
C)the implementation and conversion stage
D)in all of the stages above
Q6) Identify the item below that would be classified as an agent by the REA data model.
A)An IOU from a customer.
B)The customer.
C)A customer sale.
D)A loan from a vendor.
Q7) What is Cardinalities?
Q8) Explain how an AIS system can be viewed as a set of "give-to-get" exchanges.
Q9) Describe data modeling.
To view all questions and flashcards with answers, click on the resource link above. Page 19
Chapter 18: Implementing an Rea Model in a Relational Database
Available Study Resources on Quizplus for this Chatper
98 Verified Questions
98 Flashcards
Source URL: https://quizplus.com/quiz/65535
Sample Questions
Q1) Rebus Fashions provides haircuts to men and women.Rebus uses an REA database to record information that is important to the firm.Rebus has an M:N table named "Customer-Sale" where it keeps information about customer sales.Identify the attribute below that most likely does not belong in the Customer-Sale table.
A)Date of sale.
B)Time hair cut was started.
C)Name of customer.
D)All of the above are appropriate attributes for the Customer table.
Q2) When combining two REA diagrams by merging common entities,changes in the cardinality of the merged entity is needed when it is a(n) A)agent.
B)event.
C)relationship.
D)resource.
Q3) In an integrated REA diagram,every resource must be linked to A)at least two events.
B)at least two agents.
C)at least one other resource.
D)at least two other resources.

Page 20
To view all questions and flashcards with answers, click on the resource link above.
Chapter 19: Special Topics in Rea Modeling
Available Study Resources on Quizplus for this Chatper
98 Verified Questions
98 Flashcards
Source URL: https://quizplus.com/quiz/65534
Sample Questions
Q1) Why might an REA diagram show relationships between resources and agents?
Q2) Using an REA database design,which is the most likely primary key for the Pay for Goods table?
A)Cash transaction number.
B)Check number.
C)Invoice number.
D)Receiving report number.
Q3) Employees and Training entities is ________ ,because a given employee will,over time,attend numerous training courses and,conversely,several employees may attend the same specific training class.
A)1:1
B)1:N
C)M:N
D)1:M
Q4) In which entity would an item's standard cost information most likely be maintained?
A)Inventory entity.
B)Order_Inventory entity.
C)Inventory-Order_Inventory entity.
D)Cost entity.

21
To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Introduction to Systems Development and Systems Analysis
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/65532
Sample Questions
Q1) Discuss the relative advantages and disadvantages of the four different methods for gathering data during a systems survey.
Q2) The least time-consuming method of collecting data for use in a systems survey is A)observation.
B)interviews.
C)questionnaires.
D)reviewing system documentation.
Q3) The system objective concerned that information output should help management and users make decisions is known as A)flexibility.
B)reliability.
C)timeliness.
D)usefulness.
Q4) When seeking to describes how a system should work,the most useful approach is to
A)conduct interviews.
B)make observations.
C)distribute questionnaires.
D)read system documentation.
To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Ais Development Strategies
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/65531
Sample Questions
Q1) Who is typically responsible for installing turnkey systems?
A)An organization's IT department.
B)The vendor who provides the system.
C)A third-party hired by the system vendor.
D)Both the organization's IT department and the vendor who provides the system.
Q2) RFPs for exact hardware and software specifications have higher total costs and require more time to prepare and evaluate.
A)True
B)False
Q3) The risk of losing a fundamental understanding of a company's AIS needs and the strategic users of an AIS as a result of outsourcing is referred to as A)focus reduction.
B)loss of control.
C)reduced competitive advantage.
D)unfulfilled goals.
Q4) Explain the concept of an application service provider.
Q5) Describe the important characteristics of extreme programming (XP).
Q6) What guidelines should be followed when contracting with an outside developer to create custom software?
Page 23
To view all questions and flashcards with answers, click on the resource link above.

Chapter 22: Systems Design, implementation, and Operation
Available Study Resources on Quizplus for this Chatper
105 Verified Questions
105 Flashcards
Source URL: https://quizplus.com/quiz/65530
Sample Questions
Q1) Which element of design specification will help the project team find an efficient way to collect data for preparing sales reports?
A)Data collection.
B)Input.
C)Output.
D)Processing procedures.
Q2) Employees who are transferred internally is often a more costly alternative because they already will need to be trained.
A)True
B)False
Q3) Which of the following control considerations will help ensure that all input,processing,storage,and output activities are authorized by the appropriate managers?
A)Security.
B)Accuracy.
C)Authorization.
D)Validity.
Q4) What is the objective of output design? What are the output design considerations? What are the various categories of outputs?
To view all questions and flashcards with answers, click on the resource link above. Page 24