ACC/564 ACC564 ACC 564 WEEK 11 FINAL EXAM PART 1
- strayer university / ACC 564
- 16 Dec 2017
- Price: $30
- Other / Other
ACC 564 WEEK 11 FINAL EXAM PART 1
- Question 1
Data must be converted into information to be considered useful and meaningful for decision-making. There are six characteristics that make information both useful and meaningful. If information is free from error or bias and accurately represents the events or activities of the organization, it is representative of the characteristic of |
|||||||
|
- Question 2
Paid time-off policies, job descriptions, and procedures manuals are examples of information needed to support key decisions in what business process? |
|||||||
|
- Question 3
The primary objective of accounting is to |
|||||||
|
- Question 4
Information is |
|||||||
|
- Question 5
Which of the following is a primary activity in the value chain? |
|||||||
|
- Question 6
What usually initiates data input into a system? |
|||||||
|
- Question 7
A specialized journal would be most likely to be used to enter |
|||||||
|
- Question 8
The general ledger |
|||||||
|
- Question 9
Data must be collected about three facets of each business activity. What are they? |
|||||||
|
- Question 10
The general ledger account that corresponds to a subsidiary ledger account is known as a |
|||||||
|
- Question 11
Chas Mulligan has been hired by Yardley Security as an assistant to the internal auditor. He has been asked to thoroughly document the existing accounting information system in preparation for making recommendations for improvements. He decides to begin by meeting with the information technology staff in order to develop an understanding of the computer programs used by the system. The documentation tool that he should employ for this purpose is a |
|||||||
|
- Question 12
A flowchart that depicts the relationships among the input, processing, and output of an AIS is |
|||||||
|
- Question 13
Graphical representations of information are often supplemented by |
|||||||
|
- Question 14
Chuck and Jill Scruggs travel in their motor home six months of the year and buy unique artifacts. Within hours after the Scruggs make a purchase, they have photographed it, written a description of it, and posted it for sale on eBay with a reservation price. Anything that does not sell within a week is shipped back to Austin, Texas, for display in The House of Curiosities, a retail business that the Scruggs operate during the balance of the year. Which symbol should be used to represent the transfer of data to eBay in a context diagram of this process? |
|||||||
|
- Question 15
The Sarbanes-Oxley Act requires independent auditors to |
|||||||
|
- Question 16
The data dictionary usually is maintained |
|||||||
|
- Question 17
The potential inconsistency that could occur when there are multiple occurrences of a specific data item in a database is called the |
|||||||
|
- Question 18
Which one of the following results corresponds to the query below?
|
|||||||
|
- Question 19
The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the |
|||||||
|
- Question 20
When the human resources manager wants to gather data about vacation and personal day usage by employees and by departments, the manager would use which language? |
|||||||
|
- Question 21
Most fraud perpetrators are insiders because |
|||||||
|
- Question 22
In a ________ scheme, customer receipts are stolen and then subsequent payments by other customers are misapplied to cover the theft of the original receipts. |
|||||||
|
- Question 23
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks. This is known as |
|||||||
|
- Question 24
A simple method for catching or preventing many types of employee fraud is to |
|||||||
|
- Question 25
The most efficient way to conceal asset misappropriation is to |
|||||||
|
- Question 26
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program. |
|||||||
|
- Question 27
Computer fraud perpetrators that modify programs during systems development, allowing access into the system that bypasses normal system controls are using |
|||||||
|
- Question 28
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called |
|||||||
|
- Question 29
The unauthorized use of special system programs to bypass regular system controls and perform illegal act is called |
|||||||
|
- Question 30
During a routine audit, a review of cash receipts and related accounting entries revealed discrepancies. Upon further analysis, it was found that figures had been entered correctly and then subsequently changed, with the difference diverted to a fictitious customer account. This is an example of |
|||||||
|
- Question 31
According to the ERM, these deal with the effectiveness and efficiency of company operations, such as performance and profitability goals. |
|||||||
|
- Question 32
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports. |
|||||||
|
- Question 33
Corporate policy that requires a purchasing agent and purchasing department manager to sign off on asset purchases over $1,500 is an example of |
|||||||
|
- Question 34
Congress passed this federal law for the purpose of preventing financial statement fraud, to make financial reports more transparent and to strengthen the internal control of public companies. |
|||||||
|
- Question 35
The risk that exists before management takes any steps to control the likelihood or impact of a risk is |
|||||||
|
- Question 36
This protocol specifies the structure of packets sent over the internet and the route to get them to the proper destination. |
|||||||
|
- Question 37
Which of the following preventive controls are necessary to provide adequate security for social engineering threats? |
|||||||
|
- Question 38
The process that allows a firewall to be more effective by examining the data in the body of an IP packet, instead of just the header, is known as |
|||||||
|
- Question 39
An access control matrix |
|||||||
|
- Question 40
Which of the following is an example of a detective control? |
|||||||
|
- Question 41
Which of the following is not associated with asymmetric encryption? |
|||||||
|
- Question 42
The system and processes used to issue and manage asymmetric keys and digital certificates are known as |
|||||||
|
- Question 43
A process that takes plaintext of any length and transforms it into a short code. |
|||||||
|
- Question 44
Which of the following is not one of the three important factors determining the strength of any encryption system? |
|||||||
|
- Question 45
Asymmetric key encryption combined with the information provided by a certificate authority allows unique identification of |
|||||||
|
- Question 46
This tests a numerical amount to ensure that it does not exceed a predetermined value. |
|||||||
|
- Question 47
When a computer system's files are automatically duplicated on a second data storage system as they are changed, the process is referred to as |
|||||||
|
- Question 48
This control protects records from errors that occur when two or more users attempt to update the same record simultaneously. |
|||||||
|
- Question 49
This data entry control compares the ID number in transaction data to a master file to verify that the ID number exists. |
|||||||
|
- Question 50
Check digit verification is an example of a(n) |
|||||||
|