

Information Systems for Accountants
Exam Preparation Guide
Course Introduction
Information Systems for Accountants explores the fundamental role that information systems play in the modern accounting environment. The course examines the design, implementation, and management of accounting information systems (AIS), emphasizing how these systems support business processes, facilitate internal controls, and ensure the effective recording, processing, and reporting of financial information. Students will gain an understanding of database concepts, systems security, and audit trails, while also analyzing how technology enables compliance with regulatory requirements. Through theoretical frameworks and practical case studies, the course prepares future accountants to critically assess and leverage information systems for strategic decision-making and organizational efficiency.
Recommended Textbook
Accounting Information Systems 13th Global Edition by Marshall B. Romney
Available Study Resources on Quizplus 22 Chapters
1883 Verified Questions
1883 Flashcards
Source URL: https://quizplus.com/study-set/3427

Page 2
Chapter 1: Accounting Information Systems: an Overview
Available Study Resources on Quizplus for this Chatper
94 Verified Questions
94 Flashcards
Source URL: https://quizplus.com/quiz/68082
Sample Questions
Q1) True or False: An accounting information system requires at least one computer.
A)True
B)False
Answer: False
Q2) An AIS provides value by
A)improving products or services through information that increases quality and reduces costs.
B)providing timely and reliable information to decision makers.
C)creating new products.
D)both A and B
Answer: D
Q3) Identify the piece of information below that is typically needed to acquire a building.
A)job descriptions
B)vendor performance
C)market coverage
D)capacity needs
Answer: D
To view all questions and flashcards with answers, click on the resource link above.

Page 3
Chapter 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/68071
Sample Questions
Q1) Which of the following statements about data processing methods is true?
A)Online real-time processing does not store data in a temporary file.
B)Batch processing cannot be used to update a master file.
C)Control totals are used to verify accurate processing in both batch and online batch processing.
D)Online real-time processing is only possible with source data automation.
Answer: A
Q2) A specialized journal
A)is used to record infrequent or non-routine transactions.
B)simplifies the process of recording large numbers of repetitive transactions.
C)records all detailed data for any general ledger account that has individual sub-accounts.
D)contains summary-level data for every account of the organization.
Answer: B
Q3) A specialized journal would be most likely to be used to enter
A)sales transactions.
B)monthly depreciation adjustments.
C)annual closing entries.
D)stock issuance transactions.
Answer: A

Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Systems Documentation Techniques
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/68067
Sample Questions
Q1) Which symbol would be used in a flowchart to represent a general ledger?
A)#2
B)#1
C)#3
D)#5
Answer: A
Q2) Describe the different levels of DFDs.
Answer: The highest-level or summary view DFD,which shows major inputs/outputs and a single process is called a context diagram.The DFD itself shows inputs,major processes,and outputs; each process in the DFD can be "exploded" or shown in greater level of detail with the sub-processes and related data flows.
Q3) Which symbol would be used in a flowchart to represent a general ledger master file kept on magnetic disk?
A)#2
B)#5
C)#7
D)#8
Answer: C
To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Relational Databases
Available Study Resources on Quizplus for this Chatper
98 Verified Questions
98 Flashcards
Source URL: https://quizplus.com/quiz/68066
Sample Questions
Q1) The schema that provides an organization-wide view of the entire database is known as the
A)external-level schema.
B)internal-level schema.
C)conceptual-level schema.
D)logical view of the database.
Q2) Identify the statement below that is false with regards to basic requirements of a relational database model.
A)Primary keys can be null.
B)Foreign keys,if not null,must have values that correspond to the value of a primary key in another table.
C)All non-key attributes in a table should describe a characteristic about the object identified by the primary key.
D)Every column in a row must be single-valued.
Q3) Describe a data dictionary.
Q4) Discuss redundancy as it applies to database design.
Q5) Discuss the ways in which a well-designed DBMS will facilitate the three basic functions of creating,changing,and querying data.
Q6) List the four DBMS "languages" and describe who uses each and for what purpose.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Computer Fraud
Available Study Resources on Quizplus for this Chatper
60 Verified Questions
60 Flashcards
Source URL: https://quizplus.com/quiz/68065
Sample Questions
Q1) Lapping is best described as the process of
A)applying cash receipts to a different customer's account in an attempt to conceal previous thefts of cash receipts.
B)inflating bank balances by transferring money among different bank accounts.
C)stealing small amounts of cash,many times over a period of time.
D)increasing expenses to conceal that an asset was stolen.
Q2) What agency did the United States create to use cyber weapons and to defend against cyber attacks?
A)U.S.Cyber Command
B)Department of Network Security
C)Department of Cyber Defense
D)Department of Technology Strategy
Q3) One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as A)lapping.
B)misappropriation of assets.
C)kiting.
D)concealment.
Q4) What are some of the distinguishing characteristics of fraud perpetrators?
To view all questions and flashcards with answers, click on the resource link above. Page 7
Chapter 6: Computer Fraud and Abuse Techniques
Available Study Resources on Quizplus for this Chatper
60 Verified Questions
60 Flashcards
Source URL: https://quizplus.com/quiz/68064
Sample Questions
Q1) Individuals who use telephone lines to commit fraud and other illegal acts are typically called A)phreakers. B)crackers.
C)phishers.
D)hackers.
Q2) Which of the following is not a method of identity theft?
A)scavenging
B)phishing
C)shoulder surfing
D)phreaking
Q3) During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of A)kiting.
B)data diddling.
C)data leakage.
D)phreaking.
Q4) What is social engineering?

Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Control and Accounting Information Systems
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/68063
Sample Questions
Q1) According to the ERM,________ deal with the effectiveness and efficiency of company operations,such as performance and profitability goals.
A)compliance objectives
B)operations objectives
C)reporting objectives
D)strategic objectives
Q2) At a movie theater box office,all tickets are sequentially prenumbered.At the end of each day,the beginning ticket number is subtracted from the ending number to calculate the number of tickets sold.Then,ticket stubs collected at the theater entrance are counted and compared with the number of tickets sold.Which of the following situations does this control detect?
A)Some customers presented tickets purchased on a previous day when there wasn't a ticket taker at the theater entrance (so the tickets didn't get torn.)
B)A group of kids snuck into the theater through a back door when customers left after a show.
C)The box office cashier accidentally gives too much change to a customer.
D)The ticket taker admits his friends without tickets.
Q3) Describe the differences between general and specific authorization.
To view all questions and flashcards with answers, click on the resource link above.
9

Chapter 8: Controls for Information Security
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/68062
Sample Questions
Q1) Which of the below keeps a record of the network traffic permitted to pass through a firewall?
A)intrusion detection system
B)vulnerability scan
C)log analysis
D)penetration test
Q2) True or False: Cloud computing can potentially generate significant cost savings for an organization.
A)True
B)False
Q3) Compatibility tests utilize a(n)________,which is a list of authorized users,programs,and data files the users are authorized to access or manipulate.
A)validity test
B)biometric matrix
C)logical control matrix
D)access control matrix
Q4) Describe the function of a computer incident response team (CIRT)and the steps that a CIRT should perform following a security incident.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Confidentiality and Privacy Controls
Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/68061
Sample Questions
Q1) The first steps in protecting the privacy of personal information is to identify
A)what sensitive information is possessed by the organization.
B)where sensitive information is stored.
C)who has access to sensitive information.
D)All of the above are first steps in protecting privacy.
Q2) Identify the type of information below that is least likely to be considered "sensitive" by an organization.
A)financial statements
B)legal documents
C)strategic plans
D)product cost information
Q3) If an organization asks you to disclose your social security number,yet fails to properly dispose of your private information once it has fulfilled its purpose,the organization has likely violated which of the Generally Accepted Privacy Principles?
A)Management
B)Notice
C)Choice and consent
D)Use and retention
Q4) Describe some steps you can take to minimize your risk of identity theft.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Processing Integrity and Availability Controls
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/68081
Sample Questions
Q1) This determines if all required data items have been entered.
A)completeness check
B)field check
C)limit check
D)range check
Q2) Which of the following is a key control regarding the minimization of system downtime?
A)fault tolerance
B)disaster recovery plans
C)backup procedures
D)all of the above
Q3) The best example of an effective payroll transaction file hash total would most likely be
A)sum of net pay.
B)total number of employees.
C)sum of hours worked.
D)total of employees' social security numbers.
Q4) True or False: It is impossible to eliminate the risk of downtime.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Auditing Computer-Based Information Systems
Available Study Resources on Quizplus for this Chatper
93 Verified Questions
93 Flashcards
Source URL: https://quizplus.com/quiz/68080
Sample Questions
Q1) Explain the differences between each type of audit risk.
Q2) Consideration of risk factors and materiality is most associated with which audit stage?
A)collection of audit evidence
B)communication of audit results
C)audit planning
D)evaluation of audit evidence
Q3) Which of the following is not an information systems audit test of controls?
A)Observe computer-site access procedures.
B)Investigate how unauthorized access attempts are handled.
C)Review logical access policies and procedures.
D)Examine the results of disaster recovery plan simulations.
Q4) Assessing the quality of internal controls,the reliability of information,and operating performance are all part of
A)audit planning.
B)collection of audit evidence.
C)communication of audit results.
D)evaluation of audit evidence.
Q5) How is a financial audit different from an information systems audit?
Q6) Name and describe the different types of audits.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: The Revenue Cycle: Sales to Cash Collections
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/68079
Sample Questions
Q1) Before a shipping notice is prepared during the revenue cycle,shipping department personnel should match the inventory received from the warehouse to the A)sales order.
B)picking tickets.
C)picking ticket and sales order.
D)sales order and bill of lading.
Q2) The legitimacy of customer orders is established by ________ in paper-based customer orders.
A)the customer's signature
B)the customer's pin number
C)the customer's verbal authorization
D)prior experience with the customer
Q3) The cashier deposits checks for Benedek Incorporated and also prepares payments to vendors.Of the following,who is best able to reconcile the bank statement to Benedek's records on a regular basis?
A)cashier
B)internal audit department
C)treasurer
D)external auditor
To view all questions and flashcards with answers, click on the resource link above.
Page 14

Chapter 13: The Expenditure Cycle: Purchasing to Cash
Disbursements
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/68078
Sample Questions
Q1) Which of the following threats is not specific to the purchase requisition process of the expenditure cycle?
A)stockouts
B)purchasing from unauthorized vendors
C)requisitioning goods not needed
D)All of the above are threats in the purchase requisition process.
Q2) MacDougalKids is a mid-sized manufacturer of organic baby food.MacDougalKids uses the EOQ inventory management approach.Which of the following factors would likely be least important when selecting inventory suppliers?
A)product price
B)product quality
C)vendor delivery dependability
D)All would be equally important.
Q3) There is a symmetrical interdependence between a firm's expenditure cycle and its suppliers'
A)production cycle.
B)revenue cycle.
C)expenditure cycle.
D)general ledger and reporting system.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: The Production Cycle
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/68077
Sample Questions
Q1) ________ are incurred to ensure that products are created without defects the first time.
A)External failure costs
B)Inspection costs
C)Internal failure costs
D)Prevention costs
Q2) Identify and discuss the two common methods of production planning.
Q3) True or False: ERP systems make it easier for an organization to implement an activity based costing approach.
A)True
B)False
Q4) What is the main difference between MRP-II and JIT manufacturing systems?
A)The length of the planning horizon
B)JIT uses long-term customer demand for planning purposes,but MRP-II uses short-term customer demand for planning purposes.
C)MRP-II relies on EDI,but JIT does not.
D)There are no significant differences between MRP-II and JIT.
Q5) What types of data are accumulated by cost accounting? What is the accountant's role in cost accounting?
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: The Human Resources Management and Payroll Cycle
Available Study Resources on Quizplus for this Chatper
77 Verified Questions
77 Flashcards
Source URL: https://quizplus.com/quiz/68076
Sample Questions
Q1) Experts estimate that,on average,the costs associated with replacing an employee are about ________ the employee's annual salary.
A)one-quarter of
B)one-half of C)one and one-half times
D)twice
Q2) Executive immersion experiences are important because
A)CEOs often have no idea what rank-and-file employees do on a daily basis.
B)employees who have positive attitudes contribute to increasing company profits.
C)many employees feel upper management is out of touch.
D)it is important for organizations to take social responsibility seriously.
Q3) The threat of violation of employment laws relates directly to which activity?
A)payroll processing
B)collecting employee time data
C)hiring and recruiting
D)all of the above
Q4) Discuss the various types and sources of input into the HRM/payroll cycle.
Q5) Describe benefits and threats of incentive and bonus programs.
Q6) What controls are available to address the threat of payroll errors?
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: General Ledger and Reporting System
Available Study Resources on Quizplus for this Chatper
74 Verified Questions
74 Flashcards
Source URL: https://quizplus.com/quiz/68075
Sample Questions
Q1) Each specific data item in an XBRL document is called a(n) A)taxonomy.
B)element.
C)instance.
D)schema.
Q2) Adjusting entries that are made to recognize revenue that has been received but not yet earned are classified as A)estimates.
B)deferrals.
C)accruals.
D)revaluations.
Q3) The ________ is the managerial report that shows planned cash inflows and outflows for major investments or acquisitions.
A)journal voucher list
B)statement of cash flows
C)operating budget
D)capital expenditures budget
Q4) How is a balanced scorecard used to assess organizational performance?
Q5) How is an audit trail used in the general ledger and reporting system?
Q6) Discuss the value and role of budgets as managerial reports.
Page 18
To view all questions and flashcards with answers, click on the resource link above.

Chapter 17: Database Design Using the Rea Data Model
Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/68074
Sample Questions
Q1) Identify the minimum cardinality of any REA diagram relationship.
A)0 or 1
B)0 or N
C)1 or N
D)none of the above
Q2) It is industry standard to model relationships as ________ in entity-relationship diagrams.
A)rectangles
B)ovals
C)diamonds
D)there is no industry standard
Q3) In which stage(s)of the database design process does data modeling occur?
A)only in the systems analysis stage
B)only in the design stage
C)in both the systems analysis and design stages
D)neither the systems analysis nor the design stages
Q4) Describe the three basic rules that apply to the REA model pattern.
Q5) Describe an REA data model.
Q6) Define minimum and maximum cardinalities.
Q7) Explain how an AIS system can be viewed as a set of "give-to-get" exchanges.
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Implementing an Rea Model in a Relational Database
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/68073
Sample Questions
Q1) Which of the following is true with regards to REA diagrams and relational databases?
A)A well-designed relational database is the starting point for creating an REA diagram.
B)A well-designed REA diagram minimizes update,insert or delete anomaly problem when the diagram is implemented into a relational database.
C)REA diagrams and database design are generic across organizations.
D)The design of a relational database is specific to the organization being modeled.
Q2) When combining two REA diagrams by merging common entities,changes in the cardinality of the merged entity is needed when it is a(n)
A)agent.
B)event.
C)relationship.
D)resource.
Q3) Explain where in the REA model you can find the information normally found in a journal.
Q4) Explain a completeness check.
Q5) What are the advantages of the REA data model over the traditional AIS model?
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Special Topics in Rea Modeling
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/68072
Sample Questions
Q1) A groups entity is used to depict the following relationship.
A)is-a-kind-of
B)is-a-member-of
C)is-a-piece-of
D)is-a-group-of
Q2) In an expenditure cycle diagram,which of the following is an example of an event that larger organizations might want to include in their extended REA model?
A)Request
B)Order
C)Ship Order
D)Fill Order
Q3) Why is the event Issue Debt often modeled as a separate event entity?
Q4) The Interview event stores detailed data about each job interview.Since hiring only happens once,but there may have been several interviews,Interview is linked to the Hire Employees event in a(n)________ relationship.
A)1:N
B)1:1
C)M:N
D)0:N
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 20: Introduction to Systems Development and Systems Analysis
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/68070
Sample Questions
Q1) All of the following are benefits of planning and managing systems development except
A)controlling costs.
B)ensuring systems are consistent with organizational goals.
C)guaranteeing that employees use the system.
D)aids in keeping the organization abreast of technological change.
Q2) During ________ of systems analysis,an examination made of each development activity to define the problem to be solved.
A)information needs and systems requirements
B)the feasibility study
C)the initial investigation
D)the systems survey
Q3) Which of the following aspect of a feasibility study is concerned with meeting external reporting requirements?
A)technical feasibility
B)legal feasibility
C)scheduling feasibility
D)operational feasibility
Q4) Describe the five phases of systems analysis.
Q5) Describe the physical design stage of the systems development life cycle.
To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Ais Development Strategies
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/68069
Sample Questions
Q1) Which of the following is not one of the ways in which a Business Process Management System can improve internal control?
A)Innovative technology allows access and authorization controls to be programmed at the transaction level.
B)Documents or transactions that require approval can be electronically routed to a manager.
C)Process rules are used to alert users when actions must be taken.
D)All actions and processes are monitored and documented in a process log for periodic review.
Q2) How does outsourcing improve an organization's utilization of assets?
A)by allowing a company to completely eliminate its IS department,which will reduce its payroll costs
B)by allowing the company to sell assets to outsourcers and improve their cash position
C)by eliminating the expense of keeping up with the latest technology and,thus,eliminate the drain on cash reserves
D)Both B and C above are correct.
Q3) Describe end-user computing and the advantages and risks involved.
Q4) Explain the concept of an application service provider.
To view all questions and flashcards with answers, click on the resource link above.
Page 23

Chapter 22: Systems Design,implementation,and Operation
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/68068
Sample Questions
Q1) Yasin,a professional in information technology services,received an e-mail from Adil in the Sales Department.The e-mail read: "Yasin,I need you to run that inventory report you prepared for me last month again.Please send it to me by e-mail.Thank you,Adil." What type of report is Adil asking Yasin to provide?
A)scheduled report
B)special-purpose analysis report
C)triggered exception report
D)demand report
Q2) Over the entire life of a typical system,approximately ________ of the work takes place during development and ________ of the work takes place on software modifications and updates.
A)30%; 70%
B)40%; 60%
C)50%; 50%
D)60%; 40%
Q3) Describe the approaches to system conversion.
Q4) How can accountants help in the systems development life cycle (SDLC)process?
Q5) What output design considerations should be analyzed as part of the physical system design phase?
To view all questions and flashcards with answers, click on the resource link above. Page 24