Mabstac2

86 Questions  I  By Mblair6854
Please take the quiz to rate it.

Computer Quizzes & Trivia
Mabstac2

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    The program flowcharting symbol representing a decision is a
    • A. 

      A: Triangle

    • B. 

      B: Circle.

    • C. 

      C: Rectangle.

    • D. 

      D: Diamond.


  • 2. 
    Which of the following would lessen internal control in a computer processing system?
    • A. 

      A: The comupter libarian maintains custody of computer program instructions and detailed listings.

    • B. 

      B: Computer operators have access to operator instructions and detailed program listings.

    • C. 

      C: The control group is solely responsibile for the distribution of all computer output.

    • D. 

      D: Computer programmers write and debug programs which perform routines designed by the systems analyst.


  • 3. 
    Which of the following employees normally would be assigned the operating responsibility for designing a computer installation, including flowcharts of data processing routines?
    • A. 

      A: Computer programmer.

    • B. 

      B: Data processing manager.

    • C. 

      C: systems analyst.

    • D. 

      D: Internal auditor.


  • 4. 
    Which of the following most likely represents a significant deficiency in the internal control?
    • A. 

      A: The systems analyst reviews applications of data processing and maintains systems documentation.

    • B. 

      B: The systems programmer designs systems for computerized applications and maintains output controls.

    • C. 

      C: The control clerk establishes control over data received by the information systems departments and reconciles totals after processing.

    • D. 

      D: The accounts payable clerk prepares data for computer processing and enters the data into the computer.


  • 5. 
    One of the major problems in a computer system is that incompatible functions may be performed by the same individual.  One compensating control for this is use of
    • A. 

      A: A tape library

    • B. 

      B: A self-checking digit system.

    • C. 

      C: Computer generated hash totals.

    • D. 

      D: A computer log.


  • 6. 
    Which of the following constitutes a weakness in the internal control of a computer system?
    • A. 

      A: One generation of backup files is stored in an off-premises location.

    • B. 

      B: Machine operators distribute error messages to the control group.

    • C. 

      C: Machine operators do not have acces to the complete systems manual.

    • D. 

      D: Machine operators are supervised by the programmer.


  • 7. 
    More than one file may be stored on a single magnetic disc.  Several programs may be in the core storage unit simultaneously.  In both cases it is important to prevent the mixing of data.  One way to do this is to use
    • A. 

      A: File integrity control

    • B. 

      B: Boundary protection.

    • C. 

      C: Interleaving.

    • D. 

      D: Paging.


  • 8. 
    A control feature in an electronic data processing system requires the central processing unit (CPU) to send signals to the printer to activate the print mechanism for each character.  The print mechanism, just prior to printing, sends a signal back to the CPU verifying that the proper print position has been activated.  This type of hardware control is referred to as  
    • A. 

      A: Echo control.

    • B. 

      B: Validity control.

    • C. 

      C: Signal control.

    • D. 

      D: Check digit control.


  • 9. 
    Automated equipment controls in a computer processing system are designed to detect errors arising from
    • A. 

      A: Operation of the computer processing equipment.

    • B. 

      B: Lack of human alertness.

    • C. 

      C: Incorrect input and output data.

    • D. 

      D: Poor management of the computer processing installation.


  • 10. 
    Parity checks, read-after-write checks, and duplicate circuitry are computer controls that are designed to detect
    • A. 

      A: Erroneous internal handling of data.

    • B. 

      B: Lack of sufficient documentation for computer processes.

    • C. 

      C: Illogical programming commands.

    • D. 

      D: Illogical uses of hardware.


  • 11. 
    A system in which the end user is responsible for the development and execution of the computer application that he or she uses is referred to as
    • A. 

      A: Microcomputing.

    • B. 

      B: End-user computing.

    • C. 

      C: Distributed computing.

    • D. 

      D: Decentralized computing.


  • 12. 
    Which of the following is an advantage of using a value-added network for EDI transactions?
    • A. 

      A: Ability to deal with differing data protocols.

    • B. 

      B: Decrease in cost of EDI.

    • C. 

      C: Increase in data redundancy.

    • D. 

      D: Direct communication between trading partners.


  • 13. 
    When erroneous data are detected by computer program controls, such data may be excluded from processing and printed on an error report.  The error report should most probably be reviewed and followed up by the
    • A. 

      A: Supervisor of computer operations.

    • B. 

      B: Systems analyst.

    • C. 

      C: Control group.

    • D. 

      D: Computer programmer.


  • 14. 
    The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the
    • A. 

      A: Computer operator.

    • B. 

      B: Keypunch operator.

    • C. 

      C: Computer programmer.

    • D. 

      D: Maintenance technician.


  • 15. 
    Any assessment of the operational capabilities of a computer system must consider downtime.  Even in a fully protected system, downtime will exist because of
    • A. 

      A: Electrical power losses.

    • B. 

      B: Unscheduled maintenance.

    • C. 

      C: Unauthorized entry.

    • D. 

      D: Keypunching errors.


  • 16. 
    A procedural control used in the management of a computer center to minimize the possibility of data or program file destruction through operator error includes
    • A. 

      A: Control figures.

    • B. 

      B: Crossfooting tests.

    • C. 

      C: Limit checks.

    • D. 

      D: External labels.


  • 17. 
    Which of the following would provide the most security for sensitive data stored on a personal computer?
    • A. 

      A: Using a secure screen saver program.

    • B. 

      B: Using an eight-bit encoding scheme for hardware interfaces.

    • C. 

      C: Encrypting data files on the computer.

    • D. 

      D: Using a conventional file structure scheme.


  • 18. 
    A computer input control is designed to ensure that
    • A. 

      A: Machine procesing is accurate.

    • B. 

      B: Only authorized personnel have access to the computer area.

    • C. 

      C: Data received for processing are properly authorized and converted to machine readable form.

    • D. 

      D: Computer processing has been performed as intended for the particular application.


  • 19. 
    In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the total credit posting?
    • A. 

      A: The sum of the cash deposits plus the discounts less the sales returns.

    • B. 

      B: The sum of the cash deposits.

    • C. 

      C: The sum of the cash deposits less the discounts taken by customers.

    • D. 

      D: The sum of the cash deposits plus the discounts taken by customers.


  • 20. 
    If a control total were to be computed on each of the following data items, which would best be identified as a hash total for a payroll application?
    • A. 

      A: Hours worked.

    • B. 

      B: Total debits and total credits.

    • C. 

      C: Net pay.

    • D. 

      D: Department numbers.


  • 21. 
    Which of the following is a computer test made to ascertain whether a given characteristic belongs to the group?
    • A. 

      A: Parity check.

    • B. 

      B: Validity check.

    • C. 

      C: Echo check.

    • D. 

      D: Limit check.


  • 22. 
    First Federal S&L has an on-line real-time system, with terminals installed in all of its branches.  This system will not accept a customer's cash withdrawal instructions in excess of $1,000 without the use of a "terminal audit key."  After the transaction is authorized by a supervisor, the bank teller then processes the transaction with the audit key.  This control can be strengthened by
    • A. 

      A: On-line recording of the transaction on an audit override sheet.

    • B. 

      B: Increasing the dollar amount to $1,500.

    • C. 

      C: Requiring manual, rather than on-line, recording of all such transactions.

    • D. 

      D: Using parallel simulation.


  • 23. 
    In a daily computer run to update checking account balances and print out basic details on any customer's account that was overdrawn, the overdrawn account of the computer programmer was never printed.  Which of the following control procedures would have been most effective in detecting this fraud?
    • A. 

      A: Use of the test-data approach by the author in testing the client's program and verification of the subsidiary file.

    • B. 

      B: Use of a running control total for the master file of checking account balances and comparison with the printout.

    • C. 

      C: A program check for valid customer code.

    • D. 

      D: Periodic recompiling of programs from documented source files, and comparison with programs currently in use.


  • 24. 
    In a client/server environment, the "client" is most likely to be the
    • A. 

      A: Supplier of the computer system.

    • B. 

      B: Computers of various users.

    • C. 

      C: Computer that contains the network's software and provides services to a server.

    • D. 

      D: Database administrator.


  • 25. 
    When designing the physical layout of a data processing center, which of the following would be least likely to be a necessary control?
    • A. 

      A: Design of controls to restrict access.

    • B. 

      B: Adequate physical layout space for the operating system.

    • C. 

      C: Inclusions of an adequate power supply system with surge protection.

    • D. 

      D: Consideration of risks related to other uses of electricity in the area.


  • 26. 
    Data control language used in a relational database is most likely to include commands used to control
    • A. 

      A: The original defining of a database.

    • B. 

      B: The maintenance and querying of a database.

    • C. 

      C: Which users have various privileges relating to a database.

    • D. 

      D: The creation and alteration of tables within a database.


  • 27. 
    Which of the following is correct concerning electronic commerce security?
    • A. 

      A: Since they cannot use both, companies must decide whether to use an electronic data interchange approach or an approach using the Internet.

    • B. 

      B: Companies that wish to use the Internet for electronic commerce must adhere to the Uniform Internet Service Provider Code of Conduct.

    • C. 

      C: Use of a website "home page" instead of encryption leads to greater security in electronic transactions.

    • D. 

      D: The successful use of a firewall will help assure the security of a firm's computer systems.


  • 28. 
    A data warehouse in an example of
    • A. 

      A: On-line analytical processing.

    • B. 

      B: On-line transaction processing.

    • C. 

      C: Essential information batch processing.

    • D. 

      D: Decentralized processing.


  • 29. 
    SQL is most directly related to
    • A. 

      A: String question language processing.

    • B. 

      B: The "grandfather, father, son" method of record retention.

    • C. 

      C: Electronic commerce.

    • D. 

      D: Relational databases.


  • 30. 
    The machine language for a specific computer
    • A. 

      A: May be changed by the programmer.

    • B. 

      B: Is the same as all the other computer languages.

    • C. 

      C: Is determined by the engineers who designed the computer.

    • D. 

      D: Is always alphabetic.


  • 31. 
    The machine-language program that results when a symbolic-language program is translated is called a(n)
    • A. 

      A: Processor program.

    • B. 

      B: Object program.

    • C. 

      C: Source program.

    • D. 

      D: Wired program.


  • 32. 
    Which of the following is not a characteristic of a batch processed computer system?
    • A. 

      A: The collection of like transactions which are sorted and processed sequentially against a master file.

    • B. 

      B: Keypunching of transactions, followed by machine processing.

    • C. 

      C: The production of numerous printouts.

    • D. 

      D: The posting of a transaction, as it occurs, to several files, without intermediate printouts.


  • 33. 
    What is the computer process called when data processing is performed concurrently with a particular activity and the results are available soon enough to influence the particular course of action being taken or the decision being made?
    • A. 

      A: Batch processing.

    • B. 

      B: Real-time processing.

    • C. 

      C: Integrated data processing.

    • D. 

      D: Random access processing.


  • 34. 
    A bank wants to reject erroneous checking account numbers to avoid invalid input.  Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers.  What technique is this?
    • A. 

      A: Optical character recognition (OCR) software.

    • B. 

      B: Check digit.

    • C. 

      C: Validity check.

    • D. 

      D: Field (format) check.


  • 35. 
    Employee numbers have all numeric characters.  To prevent the input of alphabetic characters, what technique should be used?
    • A. 

      A: Optical character recognition (OCR).

    • B. 

      B: Check digit.

    • C. 

      C: Validity check.

    • D. 

      D: Field (format) check.


  • 36. 
    An input clerks enters a person’s employee number.  The computer responds with a message that reads   “Employee number that you entered is NOT assigned to an active employee.  Please reenter.”   What technique is the computer using?
    • A. 

      A: Optical character recognition (OCR).

    • B. 

      B: Check digit.

    • C. 

      C: Validity check.

    • D. 

      D: Field (format) check.


  • 37. 
    An auditor has a paper memorandum that needs to be made into a computer file so that text from the memorandum can be cut and pasted into an audit report.  In addition to a scanner, what software is needed to accomplish this task?
    • A. 

      A: Optical character recognition (OCR).

    • B. 

      B: Check digit.

    • C. 

      C: Validity check.

    • D. 

      D: Field (format ) check.


  • 38. 
    When considering disaster recovery, what type of backup facility involves an agreement between two organizations to aid each other in the event of disaster?
    • A. 

      A: Cold site.

    • B. 

      B: Hot site.

    • C. 

      C: Reciprocal agreement.

    • D. 

      D: Rollback.


  • 39. 
    Which of the following is least likely to be considered an advantage of a value-added network?
    • A. 

      A: Reduce communication and data protocol problems.

    • B. 

      B: Increased security.

    • C. 

      C: Reduced cost.

    • D. 

      D: Partners do not have to establish numerous point-to-point connections.


  • 40. 
    When used in an information technology context, EDI is
    • A. 

      A: Education Discount Interface.

    • B. 

      B: Electronic Data Interchange.

    • C. 

      C: Engineered Duplicate Integration.

    • D. 

      D: Extreme Disaster Inhibitor.


  • 41. 
    Management of a financial services company is considering a strategic decision concerning the expansion of its existing local area network (LAN) to enhance the firm’s customer service function.  Which of the following aspects of the expanded system is the least significant strategic issue for management?
    • A. 

      A: How the expanded system can contribute to the firm's long-range business plan.

    • B. 

      B: How the expanded system would support daily business operations.

    • C. 

      C: How indicators can be developed to measure how well the expanded system achieves its business objectives.

    • D. 

      D: How the expanded system will contribute to the reduction of operating costs.


  • 42. 
    Which of the following is considered to be a server in a local area network (LAN)?
    • A. 

      A: The cabling that physically interconnects the nodes of the LAN.

    • B. 

      B: A device that stores program and data files for users of the LAN.

    • C. 

      C: A device that connects the LAN to other networks.

    • D. 

      D: A workstation that is dedicated to a single user on the LAN.


  • 43. 
    A brokerage firm has changed a program so as to permit higher transaction volumes.  After proper testing of the change, the revised programs were authorized and copied to the production library.  This practice is an example of
    • A. 

      A: Prototyping.

    • B. 

      B: Program integration.

    • C. 

      C: SDLC (System Development Life Cycle).

    • D. 

      D: Change control.


  • 44. 
    With the growth of microcomputers, some organizations are allowing end-users to develop their own applications.  One of the organizational risks of this policy is
    • A. 

      A: User requirements will not be well met.

    • B. 

      B: Reduced control of data.

    • C. 

      C: Increased applications backlog.

    • D. 

      D: Increased development time.


  • 45. 
    One of the benefits of a single integrated database information system is
    • A. 

      A: Closer program-data linkage.

    • B. 

      B: Increased data redundancy.

    • C. 

      C: Reduced security.

    • D. 

      D: Increased data accessibility.


  • 46. 
    The most appropriate type of network for a company that needs its network to function inexpensively in widely separated geographical areas is 
    • A. 

      A: Local area network (LAN).

    • B. 

      B: Wide area network (WAN).

    • C. 

      C: Value added network (VAN).

    • D. 

      D: Private branch exchange (PBX).


  • 47. 
    Graphical notations that show the flow and transformation of data within a system or business area are called
    • A. 

      A: Action diagrams.

    • B. 

      B: Program structure charts.

    • C. 

      C: Conceptual data models.

    • D. 

      D: Data flow diagrams.


  • 48. 
    There are several kinds of hardware and software for connecting devices within a network and for connecting different networks to each other.  The kind of connection often used to connect dissimilar networks is a
    • A. 

      A: Gateway.

    • B. 

      B: Bridge.

    • C. 

      C: Router.

    • D. 

      D: Wiring concentrator.


  • 49. 
    Securing client/server systems is a complex task because of all of the following factors except:
    • A. 

      A: The use of relational databases.

    • B. 

      B: The number of access points.

    • C. 

      C: Concurrent operation of multiple user sessions.

    • D. 

      D: Widespread data access and update capabilities.


  • 50. 
    A program that edits a group of source language statements for syntax errors and translates the statements into an object program is a(n)
    • A. 

      A: Interpreter.

    • B. 

      B: Compiler.

    • C. 

      C: Debugger.

    • D. 

      D: Encrypter.


  • 51. 
    An organization’s computer help desk function is usually a responsibility of the
    • A. 

      A: Applications development unit.

    • B. 

      B: Systems programming unit.

    • C. 

      C: Computer operations unit.

    • D. 

      D: User departments.


  • 52. 
    The Internet is made up of a series of networks which include
    • A. 

      A: Gateways to allow mainframe computers to connect to personal computers.

    • B. 

      B: Bridges to direct messages through the optimum data path.

    • C. 

      C: Repeaters to physically connect separate local area networks (LANs).

    • D. 

      D: Routers to strengthen data signals between distant computers.


  • 53. 
    An overall description of a database, including the names of data elements, their characteristics, and their relationship to one another, would be defined by using a
    • A. 

      A: Data definition language.

    • B. 

      B: Data control language.

    • C. 

      C: Data manipulation language.

    • D. 

      D: Data command interpreter language.


  • 54. 
    Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invoke them when they want to use mainframe facilities.  A risk of this practice is that
    • A. 

      A: Personal computers become much more likely to be physically stolen.

    • B. 

      B: Anyone with access to the personal computers could log on to the mainframe.

    • C. 

      C: Backup procedures for data files would not be as effective.

    • D. 

      D: Users with inadequate training would make more mistakes.


  • 55. 
    Today organizations are using microcomputers for data presentation because microcomputer use, compared to mainframe use, is more
    • A. 

      A: Controllable.

    • B. 

      B: Conducive to data integrity.

    • C. 

      C: Reliable.

    • D. 

      D: Cost effective.


  • 56. 
    The primary objective of security software is to
    • A. 

      A: Control access to information system resources.

    • B. 

      B: Restrict access to prevent installation of unauthorized utility software.

    • C. 

      C: Detect the presence of viruses.

    • D. 

      D: Monitor the separation of duties within applications.


  • 57. 
    A validation check used to determine if a quantity ordered field contains only numbers is an example of a(an)
    • A. 

      A: Input control.

    • B. 

      B: Audit trail control.

    • C. 

      C: Processing control.

    • D. 

      D: Data security control.


  • 58. 
    Which of the following procedures would enhance the control of a computer operations department?        I.   Periodic rotation of operators.       II.   Mandatory vacations.          III.   Controlled access to the facility.     IV.   Segregation of personnel who are responsible for controlling input and output.
    • A. 

      A: I, II.

    • B. 

      B: I, II, III.

    • C. 

      C: III, IV.

    • D. 

      D: I, II, III, IV.


  • 59. 
    Encryption protection is least likely to be used in which of the following situations?
    • A. 

      A: When transactions are transmitted over local area networks.

    • B. 

      B: When wire transfers are made between banks.

    • C. 

      C: When confidential data are sent by satellite transmission.

    • D. 

      D: When financial data are sent over dedicated leased lines.


  • 60. 
    Which of the following controls would assist in detecting an error when the data input clerk records a sales invoice as $12.99 when the actual amount is $122.99?
    • A. 

      A: Batch control totals.

    • B. 

      B: Echo check.

    • C. 

      C: Limit check.

    • D. 

      D: Sign check.


  • 61. 
    Which of the following is not true?  Relational databases
    • A. 

      A: Are flexible and useful for unplanned, ad hoc queries.

    • B. 

      B: Store data in table form.

    • C. 

      C: Use trees to store data in a hierarchical structure.

    • D. 

      D: Are maintained on direct access devices.


  • 62. 
    Companies now can use electronic transfers to conduct regular business transactions.  Which of the following terms best describes a system where an agreement is made between two or more parties to electronically transfer purchase orders, sales orders, invoices, and/or other financial documents?
    • A. 

      A: Electronic mail (E-mail).

    • B. 

      B: Electronic funds transfer (EFT).

    • C. 

      C: Electronic data interchange (EDI).

    • D. 

      D: Electronic data processing (EDP).


  • 63. 
    The ability to add or update documentation items in data dictionaries should be restricted to
    • A. 

      A: Database administrators.

    • B. 

      B: System programmers.

    • C. 

      C: System librarians.

    • D. 

      D: Application programmers.


  • 64. 
    Place the following sequence of events in an AIS in the proper logical order: I. Trial balances are prepared. II. The transaction data from source documents is entered into the AIS by an end user. III. Financial reports are generated. IV. These transactions are recorded in the appropriate journal. V. The original paper source documents are filed. VI. The transactions are posted to the general and subsidiary ledgers.
    • A. 

      A. V, II, VI, IV, I, III.

    • B. 

      B. II, V, VI, IV, I, III.

    • C. 

      C. II, V, IV, VI, I, III.

    • D. 

      D. V, II, VI, IV, III, I.


  • 65. 
    A report that does not currently exist but that needs to be created on demand without having to get a software developer involved is known as a/an:
    • A. 

      A. Ad hoc report.

    • B. 

      B. Demand report.

    • C. 

      C. Exception report.

    • D. 

      D. Scheduled report.


  • 66. 
    Which one of the following statements about an accounting information system (AIS) is incorrect?
    • A. 

      A. An AIS supports day-to-day operations by collecting and storing data about an organization's transactions.

    • B. 

      B. The information produced by AIS is made available to all levels of management for use in planning and controlling an organization's activities.

    • C. 

      C. An AIS is best suited to solve problems where there is great uncertainty and ill-defined reporting requirements

    • D. 

      D. An AIS is often referred to as a transaction processing system


  • 67. 
    An Accounting Information System (AIS) is distinguished from a Management Information System (MIS) by the fact that:
    • A. 

      A. An AIS deals with financial information while an MIS handles all other information.

    • B. 

      B. An AIS is a subsystem within an MIS.

    • C. 

      C. An AIS is control-oriented while an MIS is used exclusively for planning.

    • D. 

      D. Information produced by an AIS is used only by financial people while information produced by an MIS is used throughout the organization.


  • 68. 
    A new company is trying to decide between setting up a centralized processing system and a decentralized processing system. All of the following are disadvantages of a centralized processing system that the company should consider when making the decision, except:
    • A. 

      A. There are increased processing power and data storage needs at the central location.

    • B. 

      B. There can be a reduction in local accountability.

    • C. 

      C. Input/output bottlenecks can occur at high traffic times.

    • D. 

      D. Processing can be inconsistent.


  • 69. 
    The concept of timeliness of data availability is most relevant to:
    • A. 

      A. Payroll systems.

    • B. 

      B. General ledger.

    • C. 

      C. Computerized systems.

    • D. 

      D. On-line systems.


  • 70. 
    Online transaction processing (OLTP) systems play a strategic role in electronic commerce.  One of the key features of OLTP systems is:
    • A. 

      A. Selection of products from previously distributed catalogues.

    • B. 

      B. Postal confirmation of transactions within three days of execution

    • C. 

      C. Immediate real time processing of transactions.

    • D. 

      D. Inspection of other consumer purchases as a basis for recommendations.


  • 71. 
    Mill Co. uses a batch processing method to process its sales transactions.  Data on Mill's sales transaction tape are electronically sorted by customer number and are subjected to programmed edit checks in preparing its invoices, sales journals, and updated customer account balances.  One of the direct outputs of the creation of this tape most likely would be a:
    • A. 

      A. Report showing exceptions and control totals.

    • B. 

      B. Printout of the updated inventory records.

    • C. 

      C. Report showing overdue accounts receivable.

    • D. 

      D. Printout of the sales price master file.


  • 72. 
    Which of the following statements is (are) correct for data? I. Production and test data are normally stored together in the same databases. II. Production and test data are normally stored separately, with the production data stored in production databases and the test data stored in test databases. III. Access to production and test data are normally the same.
    • A. 

      . I and III only are correct.

    • B. 

      . II and III only are correct.

    • C. 

      . II only is correct.

    • D. 

      . None of the listed statements is correct.


  • 73. 
    Which of the following statements is (are) correct for transaction processing modes? I. In batch processing, the grandfather-father-son file rotation procedure can be used either to recover from processing problems or to retain files off-site for disaster recovery. II. Batch totals, often used in batch processing, are totals of dollar fields in transactions.  The total computed from the batch is compared to an input batch total for the batch of transactions; if the two totals are the same, processing of the batch can continue. III. Hash totals, often used in batch processing, are totals of fields in transactions other than dollars.  The total computed from the batch is compared to an input hash total for the batch of transactions; if the two totals are the same, processing of the batch can continue. IV. In the past, batch processing predominated.  These days, there is no justification for batch processing.
    • A. 

      A. I and III only are correct.

    • B. 

      B. I, II, and III are correct.

    • C. 

      C. I and IV only are correct.

    • D. 

      D. II and III only are correct.


  • 74. 
    In an accounting information system, which of the following types of computer files most likely would be a master file?
    • A. 

      A. Inventory subsidiary.

    • B. 

      B. Cash disbursements.

    • C. 

      C. Cash receipts.

    • D. 

      D. Payroll transactions.


  • 75. 
    Which of the following is an advantage of a computer-based system for transaction processing over a manual system? A computer-based system:
    • A. 

      A. Does not require as stringent a set of internal controls.

    • B. 

      B. Will produce a more accurate set of financial statements.

    • C. 

      C. Will be more efficient at producing financial statements.

    • D. 

      D. Eliminates the need to reconcile control accounts and subsidiary ledgers


  • 76. 
    Avon Corporation has a management information system.  From the management information system, several different reports are available, including reports that are monthly budget vs. actual reports, reports that highlight where sales representatives have not met their assigned sales quotas, account analysis reports that can be requested by accountants as needed as a part of the closing process, and reports that are created by end users to obtain information as needed at any time during the month.  The 4 types of reports are best described as:
    • A. 

      A. Demand reports, scheduled reports, exception reports, and ad hoc reports.

    • B. 

      B. Scheduled reports, ad hoc reports, exception reports, and demand reports.

    • C. 

      C. Scheduled reports, exception reports, demand reports, and ad hoc reports.

    • D. 

      D. Exception reports, scheduled reports, demand reports, and ad hoc reports.


  • 77. 
    Lafayette Company is a corporation that conducts international trade between the U.S.  and France. It operates several computer systems to account for and control its business.  As a matter of corporate policy, it insists that all data entered into its systems pass rigorous data validation tests.  Its accounting systems process their transactions in batch although the transactions themselves are actually entered and validated online.  Which of the following statements with respect to such data validation is correct?
    • A. 

      A. Valid code tests are tests where codes entered are checked against valid values in a master file. Lafayette utilizes valid code tests on the dollar amounts in its transactions since it thinks that such tests are an effective control on the entry of the dollar amounts in its transactions.

    • B. 

      . Lafayette uses check digits on all numeric fields when the data is initially entered. Lafayette thinks that check digits on all numeric fields are an effective control on the entry of the numeric fields in these transactions.

    • C. 

      C. Batch totals are used for the account numbers in all batches of transactions as they are entered. Lafayette thinks that such batch totals are an effective control on the entry of the account numbers in its transactions.

    • D. 

      D. None of the statements is correct.


  • 78. 
    Compared to batch processing, real-time processing has which of the following advantages?
    • A. 

      A. Ease of auditing

    • B. 

      B. Ease of implementation.

    • C. 

      C. Timeliness of information.

    • D. 

      D. Efficiency of processing.


  • 79. 
    A distributed processing environment would be most beneficial in which of the following situations?
    • A. 

      A. Large volumes of data are generated at many locations and fast access is required.

    • B. 

      B. Large volumes of data are generated centrally and fast access is not required.

    • C. 

      C. Small volumes of data are generated at many locations, fast access is required, and summaries of the data are needed promptly at a central site.

    • D. 

      D. Small volumes of data are generated centrally, fast access is required, and summaries are needed monthly at many locations.


  • 80. 
    What type of computerized data processing system would be most appropriate for a company that is opening a new retail location?
    • A. 

      A. Batch processing.

    • B. 

      B. Real-time processing.

    • C. 

      C. Sequential-file processing.

    • D. 

      D. Direct-access processing.


  • 81. 
    Which of the following tasks would be included in a document flowchart for processing cash receipts?
    • A. 

      A. Compare control and remittance totals.

    • B. 

      B. Record returns and allowances.

    • C. 

      C. Authorize and generate an invoice.

    • D. 

      D. Authorize and generate a voucher.


  • 82. 
    Which of the following terms best describes a payroll system?
    • A. 

      A. Database management system (DBMS).

    • B. 

      B. Transaction processing system (TPS).

    • C. 

      C. Decision support system (DSS).

    • D. 

      D. Enterprise resource planning (ERP) system.


  • 83. 
    Compared to online real-time processing, batch processing has which of the following disadvantages?
    • A. 

      A. A greater level of control is necessary.

    • B. 

      B. Additional computing resources are required.

    • C. 

      C. Additional personnel are required.

    • D. 

      D. Stored data are current only after the update process.


  • 84. 
    Information processing where each remote computer performs a portion of the processing, thus reducing the processing burden on the central computer or computers, is called:
    • A. 

      A. Centralized Processing.

    • B. 

      B. Online, Real-Time (OLRT) Processing.

    • C. 

      C. Online Analytical Processing.

    • D. 

      D. Decentralized (Distributed) Processing.


  • 85. 
    Which of the following transaction processing modes provides the most accurate and complete information for decision making?
    • A. 

      A. Batch.

    • B. 

      B. Distributed.

    • C. 

      C. Online.

    • D. 

      D. Application.


  • 86. 
    Having decreased the number of employees and their profitability over the past 2 years, Creative Solutions Inc. has shrunk from a large to a medium sized corporation.  In an effort to save money, the CEO wants to consolidate the responsibilities of the security administrator with the computer programmer and data administrator with the database administrator. As the current chief information officer, draft a memo to Bob Gill, Chief Executive Officer, explaining why segregation of duties is so important with regards to: The security administrator taking on the responsibilities of the computer programmer. Data administrator taking on the responsibilities of the database administrator.

Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.