Purchase Requisition, Source Document, Purchase Request, Efficiency, ERP System
The key terms in these Finance chapters include Purchase Requisition, Source Document, Purchase Request, Efficiency, ERP System
A purchase requisition is a common source document used to facilitate which business activity?
inventory purchase
receipt of goods
customer sale
purchase request – Correct
The existence of multiple systems which provide information can result in all of the following except
discrepancies.
redundancies.
efficiency. – Correct
integration issues.
Which of the following is an example of an ERP system?
Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.
Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.
Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.
How can query languages be used to help make better decisions?
They can gather relevant data for decision making. – Correct
They can help the decision maker to interpret results.
These can model choose among alternative courses of action.
They can suggest a course of action.
Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process?
sell merchandise
collect payment from customers
acquire inventory
hire and train employees – Correct
A purchase requisition is a common source document used to facilitate which business activity?
inventory purchase
receipt of goods
customer sale
purchase request – Correct
The existence of multiple systems which provide information can result in all of the following except
discrepancies.
redundancies.
efficiency. – Correct
integration issues.
Which of the following is an example of an ERP system?
Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.
Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.
Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.
Doug is a freelance photographer. He keeps records of all expenses and revenues on his cell phone and then e-mails them to himself every month.
An AIS provides value by
improving products or services through information that increases quality and reduces costs.
providing timely and reliable information to decision makers.
creating new products.
both A and B – Correct
Data diddling is
verifying credit card validity; buying and selling stolen credit cards.
a technique that tricks a person into disclosing confidential information.
inserting a sleeve into an ATM so that it will not eject the victim’s card, pretending to help the
victim as a means of obtaining his PIN, and using the card and PIN to drain the account.
changing data before, during, or after it is entered into the system in order to delete, alter, or add key system data.
Acting under false pretenses to gain confidential information is called
pretexting. – Correct
superzapping.
tabnapping.
piggybacking.
Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by
scavenging. – Correct
skimming.
cyber extortion.
Internet auction fraud.
The Bear Corporation uses a tool that embeds a code into all of its digital documents. It then scours the internet, searching for codes that it has embedded into its files. When Bear finds an embedded code on the internet, it knows that confidential information has been leaked. Bear then begins identifying how the information was leaked and who was involved with the leak. Bear is using
an information rights management software.
a stop leak software.
a data loss prevention software.
a digital watermark. – Correct
Encryption is a necessary part of which information security approach?
Synthetic based defense.
Time based defense.
Continuous monitoring.
Defense in depth. – Correct
Encryption is not a panacea to protecting confidential information.
True – Correct
False
A purchase requisition is a common source document used to facilitate which business activity?
inventory purchase
receipt of goods
customer sale
purchase request – Correct
The existence of multiple systems which provide information can result in all of the following except
discrepancies.
redundancies.
efficiency. – Correct
integration issues.
Which of the following is an example of an ERP system?
Betty has a system that keeps track of the accounts payable and receivable for her plumbing business. At the end of the year, the system helps her to prepare her taxes in just two hours.
Charlie keeps records of all his business records in a shoe box. Each week he enters all of the data into spreadsheets that automatically generate purchase orders, based on predetermined inventory reorder points. Production quotas for the coming week are also automatically generated based on customer orders.
Alexis uses a computerized information system to keep track of all the financial data generated by her bakery. She is considering opening a new bakery on the east side of town.
Doug is a freelance photographer. He keeps records of all expenses and revenues on his cell phone and then e-mails them to himself every month. The files are stored on his personal computer and backed up to CD quarterly.
Encryption is a necessary part of which information security approach?
Synthetic based defense.
Time based defense.
Continuous monitoring.
Defense in depth. – Correct
Encryption is not a panacea to protecting confidential information.
True – Correct
False