We have sent an email with your new password.


Mabstac2

86 Questions  I  By Mblair6854
Computer Quizzes & Trivia
Mabstac2

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  The program flowcharting symbol representing a decision is a
A.
B.
C.
D.
2.  Which of the following would lessen internal control in a computer processing system?
A.
B.
C.
D.
3.  Which of the following employees normally would be assigned the operating responsibility for designing a computer installation, including flowcharts of data processing routines?
A.
B.
C.
D.
4.  Which of the following most likely represents a significant deficiency in the internal control?
A.
B.
C.
D.
5.  One of the major problems in a computer system is that incompatible functions may be performed by the same individual.  One compensating control for this is use of
A.
B.
C.
D.
6.  Which of the following constitutes a weakness in the internal control of a computer system?
A.
B.
C.
D.
7.  More than one file may be stored on a single magnetic disc.  Several programs may be in the core storage unit simultaneously.  In both cases it is important to prevent the mixing of data.  One way to do this is to use
A.
B.
C.
D.
8.  A control feature in an electronic data processing system requires the central processing unit (CPU) to send signals to the printer to activate the print mechanism for each character.  The print mechanism, just prior to printing, sends a signal back to the CPU verifying that the proper print position has been activated.  This type of hardware control is referred to as  
A.
B.
C.
D.
9.  Automated equipment controls in a computer processing system are designed to detect errors arising from
A.
B.
C.
D.
10.  Parity checks, read-after-write checks, and duplicate circuitry are computer controls that are designed to detect
A.
B.
C.
D.
11.  A system in which the end user is responsible for the development and execution of the computer application that he or she uses is referred to as
A.
B.
C.
D.
12.  Which of the following is an advantage of using a value-added network for EDI transactions?
A.
B.
C.
D.
13.  When erroneous data are detected by computer program controls, such data may be excluded from processing and printed on an error report.  The error report should most probably be reviewed and followed up by the
A.
B.
C.
D.
14.  The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the
A.
B.
C.
D.
15.  Any assessment of the operational capabilities of a computer system must consider downtime.  Even in a fully protected system, downtime will exist because of
A.
B.
C.
D.
16.  A procedural control used in the management of a computer center to minimize the possibility of data or program file destruction through operator error includes
A.
B.
C.
D.
17.  Which of the following would provide the most security for sensitive data stored on a personal computer?
A.
B.
C.
D.
18.  A computer input control is designed to ensure that
A.
B.
C.
D.
19.  In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the total credit posting?
A.
B.
C.
D.
20.  If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll application?
A.
B.
C.
D.
21.  Which of the following is a computer test made to ascertain whether a given characteristic belongs to the group?
A.
B.
C.
D.
22.  First Federal S&L has an on-line real-time system, with terminals installed in all of its branches.  This system will not accept a customer's cash withdrawal instructions in excess of $1,000 without the use of a "terminal audit key."  After the transaction is authorized by a supervisor, the bank teller then processes the transaction with the audit key.  This control can be strengthened by
A.
B.
C.
D.
23.  In a daily computer run to update checking account balances and print out basic details on any customer's account that was overdrawn, the overdrawn account of the computer programmer was never printed.  Which of the following control procedures would have been most effective in detecting this fraud?
A.
B.
C.
D.
24.  In a client/server environment, the "client" is most likely to be the
A.
B.
C.
D.
25.  When designing the physical layout of a data processing center, which of the following would be least likely to be a necessary control?
A.
B.
C.
D.
26.  Data control language used in a relational database is most likely to include commands used to control
A.
B.
C.
D.
27.  Which of the following is correct concerning electronic commerce security?
A.
B.
C.
D.
28.  A data warehouse in an example of
A.
B.
C.
D.
29.  SQL is most directly related to
A.
B.
C.
D.
30.  The machine language for a specific computer
A.
B.
C.
D.
31.  The machine-language program that results when a symbolic-language program is translated is called a(n)
A.
B.
C.
D.
32.  Which of the following is not a characteristic of a batch processed computer system?
A.
B.
C.
D.
33.  What is the computer process called when data processing is performed concurrently with a particular activity and the results are available soon enough to influence the particular course of action being taken or the decision being made?
A.
B.
C.
D.
34.  A bank wants to reject erroneous checking account numbers to avoid invalid input.  Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers.  What technique is this?
A.
B.
C.
D.
35.  Employee numbers have all numeric characters.  To prevent the input of alphabetic characters, what technique should be used?
A.
B.
C.
D.
36.  An input clerks enters a person’s employee number.  The computer responds with a message that reads   “Employee number that you entered is NOT assigned to an active employee.  Please reenter.”   What technique is the computer using?
A.
B.
C.
D.
37.  An auditor has a paper memorandum that needs to be made into a computer file so that text from the memorandum can be cut and pasted into an audit report.  In addition to a scanner, what software is needed to accomplish this task?
A.
B.
C.
D.
38.  When considering disaster recovery, what type of backup facility involves an agreement between two organizations to aid each other in the event of disaster?
A.
B.
C.
D.
39.  Which of the following is least likely to be considered an advantage of a value-added network?
A.
B.
C.
D.
40.  When used in an information technology context, EDI is
A.
B.
C.
D.
41.  Management of a financial services company is considering a strategic decision concerning the expansion of its existing local area network (LAN) to enhance the firm’s customer service function.  Which of the following aspects of the expanded system is the least significant strategic issue for management?
A.
B.
C.
D.
42.  Which of the following is considered to be a server in a local area network (LAN)?
A.
B.
C.
D.
43.  A brokerage firm has changed a program so as to permit higher transaction volumes.  After proper testing of the change, the revised programs were authorized and copied to the production library.  This practice is an example of
A.
B.
C.
D.
44.  With the growth of microcomputers, some organizations are allowing end-users to develop their own applications.  One of the organizational risks of this policy is
A.
B.
C.
D.
45.  One of the benefits of a single integrated database information system is
A.
B.
C.
D.
46.  The most appropriate type of network for a company that needs its network to function inexpensively in widely separated geographical areas is 
A.
B.
C.
D.
47.  Graphical notations that show the flow and transformation of data within a system or business area are called
A.
B.
C.
D.
48.  There are several kinds of hardware and software for connecting devices within a network and for connecting different networks to each other.  The kind of connection often used to connect dissimilar networks is a
A.
B.
C.
D.
49.  Securing client/server systems is a complex task because of all of the following factors except:
A.
B.
C.
D.
50.  A program that edits a group of source language statements for syntax errors and translates the statements into an object program is a(n)
A.
B.
C.
D.
51.  An organization’s computer help desk function is usually a responsibility of the
A.
B.
C.
D.
52.  The Internet is made up of a series of networks which include
A.
B.
C.
D.
53.  An overall description of a database, including the names of data elements, their characteristics, and their relationship to one another, would be defined by using a
A.
B.
C.
D.
54.  Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invoke them when they want to use mainframe facilities.  A risk of this practice is that
A.
B.
C.
D.
55.  Today organizations are using microcomputers for data presentation because microcomputer use, compared to mainframe use, is more
A.
B.
C.
D.
56.  The primary objective of security software is to
A.
B.
C.
D.
57.  A validation check used to determine if a quantity ordered field contains only numbers is an example of a(an)
A.
B.
C.
D.
58.  Which of the following procedures would enhance the control of a computer operations department?        I.   Periodic rotation of operators.       II.   Mandatory vacations.          III.   Controlled access to the facility.     IV.   Segregation of personnel who are responsible for controlling input and output.
A.
B.
C.
D.
59.  Encryption protection is least likely to be used in which of the following situations?
A.
B.
C.
D.
60.  Which of the following controls would assist in detecting an error when the data input clerk records a sales invoice as $12.99 when the actual amount is $122.99?
A.
B.
C.
D.
61.  Which of the following is not true?  Relational databases
A.
B.
C.
D.
62.  Companies now can use electronic transfers to conduct regular business transactions.  Which of the following terms best describes a system where an agreement is made between two or more parties to electronically transfer purchase orders, sales orders, invoices, and/or other financial documents?
A.
B.
C.
D.
63.  The ability to add or update documentation items in data dictionaries should be restricted to
A.
B.
C.
D.
64.  Place the following sequence of events in an AIS in the proper logical order: I. Trial balances are prepared. II. The transaction data from source documents is entered into the AIS by an end user. III. Financial reports are generated. IV. These transactions are recorded in the appropriate journal. V. The original paper source documents are filed. VI. The transactions are posted to the general and subsidiary ledgers.
A.
B.
C.
D.
65.  A report that does not currently exist but that needs to be created on demand without having to get a software developer involved is known as a/an:
A.
B.
C.
D.
66.  Which one of the following statements about an accounting information system (AIS) is incorrect?
A.
B.
C.
D.
67.  An Accounting Information System (AIS) is distinguished from a Management Information System (MIS) by the fact that:
A.
B.
C.
D.
68.  A new company is trying to decide between setting up a centralized processing system and a decentralized processing system. All of the following are disadvantages of a centralized processing system that the company should consider when making the decision, except:
A.
B.
C.
D.
69.  The concept of timeliness of data availability is most relevant to:
A.
B.
C.
D.
70.  Online transaction processing (OLTP) systems play a strategic role in electronic commerce.  One of the key features of OLTP systems is:
A.
B.
C.
D.
71.  Mill Co. uses a batch processing method to process its sales transactions.  Data on Mill's sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances.  One of the direct outputs of the creation of this tape most likely would be a:
A.
B.
C.
D.
72.  Which of the following statements is (are) correct for data? I. Production and test data are normally stored together in the same databases. II. Production and test data are normally stored separately, with the production data stored in production databases and the test data stored in test databases. III. Access to production and test data are normally the same.
A.
B.
C.
D.
73.  Which of the following statements is (are) correct for transaction processing modes? I. In batch processing, the grandfather-father-son file rotation procedure can be used either to recover from processing problems or to retain files off-site for disaster recovery. II. Batch totals, often used in batch processing, are totals of dollar fields in transactions.  The total computed from the batch is compared to an input batch total for the batch of transactions; if the two totals are the same, processing of the batch can continue. III. Hash totals, often used in batch processing, are totals of fields in transactions other than dollars.  The total computed from the batch is compared to an input hash total for the batch of transactions; if the two totals are the same, processing of the batch can continue. IV. In the past, batch processing predominated.  These days, there is no justification for batch processing.
A.
B.
C.
D.
74.  In an accounting information system, which of the following types of computer files most likely would be a master file?
A.
B.
C.
D.
75.  Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system:
A.
B.
C.
D.
76.  Avon Corporation has a management information system.  From the management information system, several different reports are available, including reports that are monthly budget vs. actual reports, reports that highlight where sales representatives have not met their assigned sales quotas, account analysis reports that can be requested by accountants as needed as a part of the closing process, and reports that are created by end users to obtain information as needed at any time during the month.  The 4 types of reports are best described as:
A.
B.
C.
D.
77.  Lafayette Company is a corporation that conducts international trade between the U.S.  and France. It operates several computer systems to account for and control its business.  As a matter of corporate policy, it insists that all data entered into its systems pass rigorous data validation tests.  Its accounting systems process their transactions in batch although the transactions themselves are actually entered and validated online.  Which of the following statements with respect to such data validation is correct?
A.
B.
C.
D.
78.  Compared to batch processing, real-time processing has which of the following advantages?
A.
B.
C.
D.
79.  A distributed processing environment would be most beneficial in which of the following situations?
A.
B.
C.
D.
80.  What type of computerized data processing system would be most appropriate for a company that is opening a new retail location?
A.
B.
C.
D.
81.  Which of the following tasks would be included in a document flowchart for processing cash receipts?
A.
B.
C.
D.
82.  Which of the following terms best describes a payroll system?
A.
B.
C.
D.
83.  Compared to online real-time processing, batch processing has which of the following disadvantages?
A.
B.
C.
D.
84.  Information processing where each remote computer performs a portion of the processing, thus reducing the processing burden on the central computer or computers, is called:
A.
B.
C.
D.
85.  Which of the following transaction processing modes provides the most accurate and complete information for decision making?
A.
B.
C.
D.
86.  Having decreased the number of employees and their profitability over the past 2 years, Creative Solutions Inc. has shrunk from a large to a medium sized corporation.  In an effort to save money, the CEO wants to consolidate the responsibilities of the security administrator with the computer programmer and data administrator with the database administrator. As the current chief information officer, draft a memo to Bob Gill, Chief Executive Officer, explaining why segregation of duties is so important with regards to:
  1. The security administrator taking on the responsibilities of the computer programmer.
  2. Data administrator taking on the responsibilities of the database administrator.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz