ACC 564
FINAL EXAM PART 1
Click Link Below To Buy:
Contact Us:
Hwcoursehelp@gmail.com
· Question 1
4 out of 4 points
When two knowledgeable people
acting independently each produce the same information, this information is
said to be
|
||||
· Question 2
4 out of 4 points
A frantic StroFrinzel called the
home office from Des Moines. "You have got to help me. I am about to
close a great sale, but I have to be able to guarantee delivery by the
fourteenth. I can't get through to the company Web site to verify
delivery!" "Thank you for calling. Your call is very important to
us. However, all of our lines are currently in use. Please try again
later." Which of the following characteristics of useful information is
absent in the situation described above?
|
||||
· Question 3
4 out of 4 points
The process of creating value for
customers is the result of nine activities that form a
|
||||
· Question 4
4 out of 4 points
One group that relies on both the
adequate collection and transformation of data for decision-making purposes
for an organization is
|
||||
· Question 5
4 out of 4 points
Transaction cycles can be
summarized on a high level as "give-get" transactions. An example
of "give-get" in the expenditure cycle would be
|
||||
· Question 6
4 out of 4 points
The coding technique most likely
used for sales orders is called a
|
||||
· Question 7
4 out of 4 points
Pre-numbering of source documents
helps to verify that
|
||||
· Question 8
4 out of 4 points
Documents that are sent to
customers or suppliers and then sent back to the company in the course of a
business transaction are known as
|
||||
· Question 9
4 out of 4 points
The quality assurance department
at a large manufacturing business enters data into the AIS that is used to produce
a weekly report that summarizes the proportion of defective units in each
product line. This is an example of
|
||||
· Question 10
4 out of 4 points
The general ledger account that
corresponds to a subsidiary ledger account is known as a
|
||||
· Question 11
4 out of 4 points
In general, a data destination
will be shown by
|
||||
· Question 12
4 out of 4 points
In a document flowchart of a
manual payroll processing system, "update employee file" will be
shown by a(n) ________ symbol, and "prepare payroll check" will be
shown by a(n) ________ symbol.
|
||||
· Question 13
4 out of 4 points
When preparing a document
flowchart, the names of organizational departments or job functions should
appear in the
|
||||
· Question 14
4 out of 4 points
The Union Soup Kitchen is a
non-profit organization that collects, stores, prepares and provides food to
the homeless in Erie, Pennsylvania. Donations of food are recorded in a
database and a receipt is provided to the donor. When food is used, the
database is updated so that it always reflects the amounts and types of food
that are available. In a data flow diagram, which type of symbol would be
used to represent the processing of donations?
|
||||
· Question 15
4 out of 4 points
The Sarbanes-Oxley Act requires
independent auditors to
|
||||
· Question 16
4 out of 4 points
Record layouts, definitions,
addresses, and indexes will be stored at the ________ level schema.
|
||||
· Question 17
4 out of 4 points
The combination of the database,
the DBMS, and the application programs that access the database through the
DBMS is referred to as the
|
||||
· Question 18
4 out of 4 points
The problem of losing desired
information from a database when an unwanted record is purged from the
database is referred to as the ________ anomaly.
|
||||
· Question 19
4 out of 4 points
The delete anomaly
|
||||
· Question 20
4 out of 4 points
The data dictionary usually is maintained
|
||||
· Question 21
4 out of 4 points
Intentional or reckless conduct
that results in materially misleading financial statements is called
|
||||
· Question 22
4 out of 4 points
Which of the following is an
opportunity that could contribute to employee fraud?
|
||||
· Question 23
4 out of 4 points
One fraudulent scheme covers up a
theft by creating cash through the transfer of money between banks. This is
known as
|
||||
· Question 24
4 out of 4 points
Computer fraud is often much more
difficult to detect than other types of fraud because
|
||||
· Question 25
4 out of 4 points
In many cases of fraud, the
________ takes more time and effort than the ________.
|
||||
· Question 26
4 out of 4 points
Tapping into a communications line
and then entering the system by accompanying a legitimate user without their
knowledge is called
|
||||
· Question 27
4 out of 4 points
A set of unauthorized computer
instructions in an otherwise properly functioning program is known as a
|
||||
· Question 28
4 out of 4 points
The call to tech support was
fairly routine. A first-time computer user had purchased a brand new PC two
months ago and it was now operating much more slowly and sluggishly than it
had at first. Had he been accessing the Internet? Yes. Had he installed any
"free" software? Yes. The problem is likely to be a(an)
|
||||
· Question 29
4 out of 4 points
Jiao Jan had been the Web master
for Folding Squid Technologies for only three months when he received an
anonymous email that threatened to inundate the company Web site with access
attempts unless a payment was wired to an account in Eastern Europe. Jiao was
concerned that FST would suffer significant losses if the threat was genuine.
The author of the email was engaged in
|
||||
· Question 30
4 out of 4 points
The unauthorized use of special
system programs to bypass regular system controls and perform illegal act is
called
|
||||
· Question 31
4 out of 4 points
The risk that exists before
management takes any steps to control the likelihood or impact of a risk is
|
||||
· Question 32
4 out of 4 points
Internal control is often referred
to as a(n) ________, because it permeates an organization's operating
activities and is an integral part of management activities.
|
||||
· Question 33
4 out of 4 points
The primary purpose of the Foreign
Corrupt Practices Act of 1977 was
|
||||
· Question 34
4 out of 4 points
According to the ERM, these deal
with the effectiveness and efficiency of company operations, such as
performance and profitability goals.
|
||||
· Question 35
4 out of 4 points
Store policy that allows retail
clerks to process sales returns for $300 or less, with a receipt dated within
the past 60 days, is an example of
|
||||
· Question 36
4 out of 4 points
Restricting access of users to
specific portions of the system as well as specific tasks, is
|
||||
· Question 37
4 out of 4 points
A special purpose hardware device
or software running on a general purpose computer, which filters information
that is allowed to enter and leave the organization's information system, is
known as a(n)
|
||||
· Question 38
4 out of 4 points
Which of the following is an
example of a corrective control?
|
||||
· Question 39
4 out of 4 points
In 2007, a major U.S. financial
institution hired a security firm to attempt to compromise its computer
network. A week later, the firm reported that it had successfully entered the
system without apparent detection and presented an analysis of the vulnerabilities
that had been found. This is an example of a
|
||||
· Question 40
4 out of 4 points
The most common input-related
vulnerability is
|
||||
· Question 41
4 out of 4 points
The system and processes used to
issue and manage asymmetric keys and digital certificates are known as
|
||||
· Question 42
4 out of 4 points
These are used to create digital
signatures.
|
||||
· Question 43
4 out of 4 points
In developing policies related to
personal information about customers, Folding Squid Technologies adhered to
the Trust Services framework. The standard applicable to these policies is
|
||||
· Question 44
4 out of 4 points
Which of the following
descriptions is not associated with symmetric encryption?
|
||||
· Question 45
4 out of 4 points
A process that takes plaintext of
any length and transforms it into a short code.
|
||||
· Question 46
4 out of 4 points
When I enter a correct customer
number, the data entry screen displays the customer name and address. This is
an example of
|
||||
· Question 47
4 out of 4 points
Data matching is an example of
a(n)
|
||||
· Question 48
4 out of 4 points
This determines if all required
data items have been entered.
|
||||
· Question 49
4 out of 4 points
A data entry input control in
which the application software sums the first four digits of a customer
number to calculate the value of the fifth digit and then compares the
calculated number to the number typed in during data entry is an example of a
|
||||
· Question 50
4 out of 4 points
Forms design is an example of this
type of control.
|
||||
No comments:
Post a Comment