Information System – Accounting And Finance Exam

Twitter - Quiz Tutors
Information System - Accounting And Finance Exam. Facebook - Quiz Tutors

Information System – Accounting And Finance Exam

The key terms in these Finance chapters include Information System.


Identify the piece of information below that is typically needed to hire and train employees.

market coverage

job descriptionsCorrect

capacity needs

vendor performance


In which transaction cycle would information for initiating back orders for out of stock goods be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the human resources / payroll cycle

the revenue cycleCorrect


In which transaction cycle would information relating to employees benefit be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the revenue cycle

the human resources / payroll cycleCorrect


Use the chart below to answer the following questions regarding flow chart symbols.

Information System - Accounting And Finance Exam


Which symbol would be used in a flowchart to represent a computer process?

#2

#3

#5 – Correct

#1


The logical structure of a database is described by the

context diagram.

data dictionary.

database management system.

schema.Correct


The ________ handles the link between the way data are physically stored and each user’s logical view of that data.

data warehouse

database management software (DBMS)Correct

data dictionary

database manager


A set of individual user views of the database is called the

internal-level schema.

meta-schema.

conceptual-level schema.

external-level schema.Correct


Identify the piece of information below that is typically needed to hire and train employees.

market coverage

job descriptionsCorrect

capacity needs

vendor performance


Abbie Johnson is a programmer at Healtheast network. Abbie has recently developed a new computer program for Healtheast. As part of the testing process, Abbie needs to use realistic patients data to ensure that the system is working properly. To protect privacy, management at Healtheast uses a program that replaces private patient information with fake values before sending the data to Abbie for testing. The program that replaces patient information with fake values is called

data redacting.

data masking. – Correct

data wiping.


Information System – Accounting And Finance Exam


If an organization asks you to disclose your date of birth and your address, but fails to establish any procedures for responding to customer complaints, the organization has likely violated which of the Generally Accepted Privacy Principles?

Monitoring and enforcement. – Correct

Security.

Access.

Collection.


In which transaction cycle would information for initiating back orders for out of stock goods be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the human resources / payroll cycle

the revenue cycleCorrect


In which transaction cycle would information relating to employees benefit be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the revenue cycle

the human resources / payroll cycleCorrect


A 16 year old hacker was able to access the systems of U.S. Missile Command and accidently launched a small nuclear missile, which fortunately, failed to detonate.

True

FalseCorrect


Identify the threat below that is not one of the four types of threats faced by accounting information systems.

Software errors and equipment malfunctions

System design inefficiencyCorrect

Natural and political disasters

Unintentional acts


Fraud perpetrators are often referred to as

white-collar criminals.Correct

blue-collar criminals.

outlaws.

bad actors.


Which type of audit assesses employee compliance with management policies and procedures?

Compliance audit.

External audit.

Operational audit.

Internal audit.Correct


Kuzman Jovan called a meeting of the top management at Jovan Capital Management. Number one on the agenda was computer system security. “The risk of security breach incidents has become unacceptable,” he said, and turned to the Chief Information Officer. “What do you intend to do?” Which of the following is the best answer?

Evaluate and modify the system using COBOL.

Evaluate and modify the system using the Trust Services frameworkCorrect


Identify the piece of information below that is typically needed to hire and train employees.

market coverage

job descriptionsCorrect

capacity needs

vendor performance


In which transaction cycle would information for initiating back orders for out of stock goods be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the human resources / payroll cycle

the revenue cycleCorrect


In which transaction cycle would information relating to employees benefit be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the revenue cycle

the human resources / payroll cycleCorrect


Fraud perpetrators are often referred to as

white-collar criminals.Correct

blue-collar criminals.

outlaws.

bad actors.


Which type of audit assesses employee compliance with management policies and procedures?

Compliance audit.

External audit.

Operational audit.

Internal audit.Correct

Kuzman Jovan called a meeting of the top management at Jovan Capital Management. Number one on the agenda was computer system security. “The risk of security breach incidents has become unacceptable,” he said, and turned to the Chief Information Officer. “What do you intend to do?” Which of the following is the best answer?

Evaluate and modify the system using the COSO Internal Control Framework.

Evaluate and modify the system using the Trust Services frameworkCorrect


Identify the piece of information below that is typically needed to hire and train employees.

market coverage

job descriptionsCorrect

capacity needs

vendor performance


Kuzman Jovan called a meeting of the top management at Jovan Capital Management. Number one on the agenda was computer system security. “The risk of security breach incidents has become unacceptable,” he said, and turned to the Chief Information Officer. “What do you intend to do?” Which of the following is the best answer?

Evaluate and modify the system using the CTC checklist.

Evaluate and modify the system using the Trust Services frameworkCorrect


Identify the piece of information below that is typically needed to hire and train employees.

market coverage

job descriptionsCorrect

capacity needs

vendor performance


In which transaction cycle would information for initiating back orders for out of stock goods be most likely to pass between internal and external accounting information systems?

the expenditure cycle

the financing cycle

the human resources / payroll cycle

the revenue cycleCorrect


Homepge