Twitter - Quiz Tutors
Purchase Requisition & Source Document - Finance
Facebook - Quiz Tutors

Purchase Requisition, Source Document, Purchase Request, Efficiency, ERP System

The key terms in these Finance chapters include Purchase Requisition, Source Document, Purchase Request, Efficiency, ERP System


A purchase requisition is a common source document used to facilitate which business activity?

inventory purchase

receipt of goods

customer sale

purchase requestCorrect


The existence of multiple systems which provide information can result in all of the following except

discrepancies.

redundancies.

efficiency.Correct

integration issues.


Which of the following is an example of an ERP system?

Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.

Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.

Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.


How can query languages be used to help make better decisions?

They can gather relevant data for decision making.Correct

They can help the decision maker to interpret results.

These can model choose among alternative courses of action.

They can suggest a course of action.


Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process?

sell merchandise

collect payment from customers

acquire inventory

hire and train employeesCorrect


A purchase requisition is a common source document used to facilitate which business activity?

inventory purchase

receipt of goods

customer sale

purchase requestCorrect

The existence of multiple systems which provide information can result in all of the following except

discrepancies.

redundancies.

efficiency.Correct

integration issues.


Which of the following is an example of an ERP system?

Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.

Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.

Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.

Doug is a freelance photographer. He keeps records of all expenses and revenues on his cell phone and then e-mails them to himself every month.


An AIS provides value by

improving products or services through information that increases quality and reduces costs.

providing timely and reliable information to decision makers.

creating new products.

both A and BCorrect

Data diddling is

verifying credit card validity; buying and selling stolen credit cards.

a technique that tricks a person into disclosing confidential information.

inserting a sleeve into an ATM so that it will not eject the victim’s card, pretending to help the
victim as a means of obtaining his PIN, and using the card and PIN to drain the account.

changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.


Acting under false pretenses to gain confidential information is called

pretexting.Correct

superzapping.

tabnapping.

piggybacking.


Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by

scavenging.Correct

skimming.

cyber extortion.

Internet auction fraud.


The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using

an information rights management software.

a stop leak software.

a data loss prevention software.

a digital watermark.Correct


Encryption is a necessary part of which information security approach?

Synthetic based defense.

Time based defense.

Continuous monitoring.

Defense in depth.Correct

Encryption is not a panacea to protecting confidential information.

TrueCorrect

False


A purchase requisition is a common source document used to facilitate which business activity?

inventory purchase

receipt of goods

customer sale

purchase requestCorrect


The existence of multiple systems which provide information can result in all of the following except

discrepancies.

redundancies.

efficiency.Correct

integration issues.


Which of the following is an example of an ERP system?

Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.

Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.

Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.

Doug is a freelance photographer. He keeps records of all expenses and revenues on his cell phone and then e-mails them to himself every month. The files are stored on his personal computer and backed up to CD quarterly.


Encryption is a necessary part of which information security approach?

Synthetic based defense.

Time based defense.

Continuous monitoring.

Defense in depth.Correct


Encryption is not a panacea to protecting confidential information.

TrueCorrect

False


Homepage