Wednesday 3 January 2018

ACC 564 FINAL EXAM PART 1


ACC 564 FINAL EXAM PART 1

Click Link Below To Buy:

Contact Us:
Hwcoursehelp@gmail.com

·  Question 1
4 out of 4 points
When two knowledgeable people acting independently each produce the same information, this information is said to be
·  Question 2
4 out of 4 points
A frantic StroFrinzel called the home office from Des Moines. "You have got to help me. I am about to close a great sale, but I have to be able to guarantee delivery by the fourteenth. I can't get through to the company Web site to verify delivery!" "Thank you for calling. Your call is very important to us. However, all of our lines are currently in use. Please try again later." Which of the following characteristics of useful information is absent in the situation described above?
·  Question 3
4 out of 4 points
The process of creating value for customers is the result of nine activities that form a
·  Question 4
4 out of 4 points
One group that relies on both the adequate collection and transformation of data for decision-making purposes for an organization is
·  Question 5
4 out of 4 points
Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the expenditure cycle would be
·  Question 6
4 out of 4 points
The coding technique most likely used for sales orders is called a
·  Question 7
4 out of 4 points
Pre-numbering of source documents helps to verify that
·  Question 8
4 out of 4 points
Documents that are sent to customers or suppliers and then sent back to the company in the course of a business transaction are known as
·  Question 9
4 out of 4 points
The quality assurance department at a large manufacturing business enters data into the AIS that is used to produce a weekly report that summarizes the proportion of defective units in each product line. This is an example of
·  Question 10
4 out of 4 points
The general ledger account that corresponds to a subsidiary ledger account is known as a
·  Question 11
4 out of 4 points
In general, a data destination will be shown by
·  Question 12
4 out of 4 points
In a document flowchart of a manual payroll processing system, "update employee file" will be shown by a(n) ________ symbol, and "prepare payroll check" will be shown by a(n) ________ symbol.
·  Question 13
4 out of 4 points
When preparing a document flowchart, the names of organizational departments or job functions should appear in the
·  Question 14
4 out of 4 points
The Union Soup Kitchen is a non-profit organization that collects, stores, prepares and provides food to the homeless in Erie, Pennsylvania. Donations of food are recorded in a database and a receipt is provided to the donor. When food is used, the database is updated so that it always reflects the amounts and types of food that are available. In a data flow diagram, which type of symbol would be used to represent the processing of donations?
·  Question 15
4 out of 4 points
The Sarbanes-Oxley Act requires independent auditors to
·  Question 16
4 out of 4 points
Record layouts, definitions, addresses, and indexes will be stored at the ________ level schema.
·  Question 17
4 out of 4 points
The combination of the database, the DBMS, and the application programs that access the database through the DBMS is referred to as the
·  Question 18
4 out of 4 points
The problem of losing desired information from a database when an unwanted record is purged from the database is referred to as the ________ anomaly.
·  Question 19
4 out of 4 points
The delete anomaly
·  Question 20
4 out of 4 points
The data dictionary usually is maintained
·  Question 21
4 out of 4 points
Intentional or reckless conduct that results in materially misleading financial statements is called
·  Question 22
4 out of 4 points
Which of the following is an opportunity that could contribute to employee fraud?
·  Question 23
4 out of 4 points
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as
·  Question 24
4 out of 4 points
Computer fraud is often much more difficult to detect than other types of fraud because
·  Question 25
4 out of 4 points
In many cases of fraud, the ________ takes more time and effort than the ________.
·  Question 26
4 out of 4 points
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
·  Question 27
4 out of 4 points
A set of unauthorized computer instructions in an otherwise properly functioning program is known as a
·  Question 28
4 out of 4 points
The call to tech support was fairly routine. A first-time computer user had purchased a brand new PC two months ago and it was now operating much more slowly and sluggishly than it had at first. Had he been accessing the Internet? Yes. Had he installed any "free" software? Yes. The problem is likely to be a(an)
·  Question 29
4 out of 4 points
Jiao Jan had been the Web master for Folding Squid Technologies for only three months when he received an anonymous email that threatened to inundate the company Web site with access attempts unless a payment was wired to an account in Eastern Europe. Jiao was concerned that FST would suffer significant losses if the threat was genuine. The author of the email was engaged in
·  Question 30
4 out of 4 points
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called
·  Question 31
4 out of 4 points
The risk that exists before management takes any steps to control the likelihood or impact of a risk is
·  Question 32
4 out of 4 points
Internal control is often referred to as a(n) ________, because it permeates an organization's operating activities and is an integral part of management activities.
·  Question 33
4 out of 4 points
The primary purpose of the Foreign Corrupt Practices Act of 1977 was
·  Question 34
4 out of 4 points
According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals.
·  Question 35
4 out of 4 points
Store policy that allows retail clerks to process sales returns for $300 or less, with a receipt dated within the past 60 days, is an example of
·  Question 36
4 out of 4 points
Restricting access of users to specific portions of the system as well as specific tasks, is
·  Question 37
4 out of 4 points
A special purpose hardware device or software running on a general purpose computer, which filters information that is allowed to enter and leave the organization's information system, is known as a(n)
·  Question 38
4 out of 4 points
Which of the following is an example of a corrective control?
·  Question 39
4 out of 4 points
In 2007, a major U.S. financial institution hired a security firm to attempt to compromise its computer network. A week later, the firm reported that it had successfully entered the system without apparent detection and presented an analysis of the vulnerabilities that had been found. This is an example of a
·  Question 40
4 out of 4 points
The most common input-related vulnerability is
·  Question 41
4 out of 4 points
The system and processes used to issue and manage asymmetric keys and digital certificates are known as
·  Question 42
4 out of 4 points
These are used to create digital signatures.
·  Question 43
4 out of 4 points
In developing policies related to personal information about customers, Folding Squid Technologies adhered to the Trust Services framework. The standard applicable to these policies is
·  Question 44
4 out of 4 points
Which of the following descriptions is not associated with symmetric encryption?
·  Question 45
4 out of 4 points
A process that takes plaintext of any length and transforms it into a short code.
·  Question 46
4 out of 4 points
When I enter a correct customer number, the data entry screen displays the customer name and address. This is an example of
·  Question 47
4 out of 4 points
Data matching is an example of a(n)
·  Question 48
4 out of 4 points
This determines if all required data items have been entered.
·  Question 49
4 out of 4 points
A data entry input control in which the application software sums the first four digits of a customer number to calculate the value of the fifth digit and then compares the calculated number to the number typed in during data entry is an example of a
·  Question 50
4 out of 4 points
Forms design is an example of this type of control.


No comments:

Post a Comment