According to the textbook which of these statements is most


Questions -

Q1. Which of the following is not an ability of client/server computing?

a) Alter data stored elsewhere on the network

b) Process a transaction that may affect data stored on both client and server computers

c) Query or manipulate the warehoused data on the server

d) Increased networking capabilities between different file formats on multiple systems

Q2. Software that enables businesses and government agencies to transmit and manipulate financial data on an organization-wide basis best describes:

a. Communication software

b. CAD software

c. Enterprise resource planning (ERP) software

d. Programming software

Q3. The textbook identified seven reasons why documentation of an AIS is important. For which of the following reasons would the user guides, procedure manuals and operating instructions be most important?

a) Depicting how the system works

b) Training users

c) Designing new systems

d) Standardizing communications with others

Q4. According to the textbook, which of these statements is most accurate?

a) Most computer abuse is performed as retaliation against employers

b) Very little computer crime is committed for personal gain

c) Some computer abuse is performed simply to meet a challenge

d) We catch most computer abusers with good accounting controls

Q5.One of the major crimes identified by the Computer Fraud and Abuse Act of 1986 is intent to illegally obtain information or tangible property through the use of computers. Which of the following methods might accomplish this type of crime if the perpetrator can change data before, during, or after they are entered into a computer system?

a) Salami technique

b) Data diddling

c) Shoulder surfing

d) Trojan horse program

Q6. Which of the following is not a general objective in the design of an information system?

a) A system should provide information which is timely and relevant for decision making by management and operating personnel

b) The output of a system should be highly accurate

c) A system should have sufficient capacity to accommodate levels of normal activity; any additional capacity proves too costly in the long run

d) A system should be as simple as permitted so that its structure and operation can be easily understood and its procedures easily accomplished

e) A system should be flexible to accommodate changes of a reasonable magnitude when required

Q7. A computerized AIS is harder to audit than a manual system for all of the following reasons except:

a) The file information is not human readable

b) The volume of transaction records and master file records is usually much larger in computerized systems than in manual systems

c) An audit trail does not exist in a computerized AIS

d) Computerized systems often use remote real-time data processing, thus complicating the tracing of transaction records to their sources

Q8. Which of the following is not one of the groups of SOX compliance requirements?

a) requirements to use an IT auditor to evaluate controls

b) regulations governing executive reporting and conduct

c) rules about financial statement reporting

d) audit committee/corporate governance requirements

Q9. Three common techniques auditors use to test computer programs are:

a) Test data, integrated test facilities, and parallel simulation

b) Test data, edit checks, and integrated test facilities

c) Test data, program change control, and parallel simulation

d) Program change control, edit checks, and parallel simulation

Q10. The term data encryption refers to:

a) Storing data in safe places called "crypts"

b) Transforming data into secret codes

c) Scrambling data in random ways that cannot be unscrambled

d) none of these

Q11. The term key in the context of data encryption refers to:

a) A physical key similar to a house key

b) A logical key similar to the primary key of a data file

c) A mathematical function used for encryption purposes

d) A computer function key that can be found on keyboards

Q12. All of the following are benefits of XBRL except:

a) Companies can file financial information in one format, avoiding the errors that may come from reentering data multiple times

b) The SEC accepts XBRL-format for electronic filing of financial statement reports

c) XBRL permits the automatic and reliable exchange of financial information across all software formats and technologies, including the Internet

d) all of the above are benefits of XBRL

e) none of the above are benefits of XBRL

Q13. Which one of these is not a good guideline to follow when creating tables in a relational database?

a) Design first, create tables later

b) Name tables systematically, using conventional "tbl" prefixes

c) Use mnemonic names for data fields

d) Assign at least 50 characters to each text field

e) Use consistent data types for primary and foreign key fields

Solution Preview :

Prepared by a verified Expert
Accounting Basics: According to the textbook which of these statements is most
Reference No:- TGS02825883

Now Priced at $20 (50% Discount)

Recommended (91%)

Rated (4.3/5)