AIS615 TEST 1 10% (JULY 2020) PDF

Title AIS615 TEST 1 10% (JULY 2020)
Author nurul nazlina
Course Accounting Information System
Institution Universiti Teknologi MARA
Pages 4
File Size 72.8 KB
File Type PDF
Total Downloads 77
Total Views 709

Summary

AIS615 TEST 1 10% (SEM JULY 2020)TRUE OR FALSE Data are facts that are collected, recorded, stored and processed by an information system. Information is reliable when it is free from error or bias and accurately represents the events or activities of the organization. Receiving goods from vendors i...


Description

AIS615 TEST 1 10% (SEM JULY 2020) TRUE OR FALSE 1. Data are facts that are collected, recorded, stored and processed by an information system. 2. Information is reliable when it is free from error or bias and accurately represents the events or activities of the organization. 3. Receiving goods from vendors is part of the revenue cycle. 4. Data collection is one of the steps in the data processing cycle. 5. A purchase order is an example of a turnaround document. 6. Simplicity and reduced costs are the disadvantages of Enterprise Resource Planning (ERP) systems. 7. The database is a set of interrelated, centrally coordinated data files that are stored with as little data redundancy as possible. 8. A row in a table that contains data about a specific item in a database table is called a tuple. 9. The database management system (DBMS) is a software program that acts as an interface between a database and various application programs. 10. An intentional act is one of the four types of AIS threats. 11. Failure to perform preventive maintenance on a computer is an example of computer fraud. 12. Virus protection controls are the most important, basic and effective control to deter fraud. 13. Phishing consists of the unauthorized copying of company data. 14. Sending an unsolicited message to many people at the same time is known as spamming. 15. A computer virus is a segment of executable code that attaches itself to computer software. MCQ 1) Information is best described as A) raw facts about transactions. B) data that has been organized and processed so that it is meaningful to the user. C) facts that are useful when processed in a timely manner. D) the same thing as data.

2) Which of the following is a primary activity in the value chain? A) purchasing. B) accounting. C) post-sales service. D) human resource management.

3) Which of the following is not an example of how an AIS adds value to an organization? A) All employees at a hospital can access and update patient records from any computer terminal in the hospital. B) A customer service representative can find a customer's account data, purchase history, payment history, and salesperson's name while on the phone with the customer, to resolve issues quickly. C) Suppliers are able to access sales data directly from the point-of-sale system of a retailer and deliver inventory automatically when needed. D) Client tax files are encrypted and made available on the CPA firm's network to any employee with an access code.

4) Which of the following is not considered a source document? A) A copy of the company's financial statements. B) A copy of the company's shipping document. C) A copy of the company's sales journal. D) A copy of the company's ledger.

5) Identify the item below that is not one of the four different types of data processing activities. A) creating B) reading C) using D) deleting

6) Making payments to a vendor, with whom a credit line is already established, would be initially recorded in which type of accounting record and as part of what transaction cycle? A) purchases journal; expenditure cycle B) general journal; expenditure cycle C) general ledger; expenditure cycle D) cash disbursements journal; expenditure cycle

7) File-oriented approaches create problems for organizations because of A) multiple transaction files. B) a lack of sophisticated file maintenance software.

C) multiple users. D) multiple master files.

8) All of the following are benefits of the database approach except A) data integration and sharing. B) decentralized management of data. C) minimal data redundancy. D) cross-functional analysis and reporting.

9) Which is probably the most immediate and significant effect of database technology on accounting? A) Replacement of the double entry-system. B) Change in the nature of financial reporting. C) Elimination of traditional records such as journals and ledgers. D) Quicker access to and greater use of accounting information in decision-making.

10) Which of the following is the greatest risk to information systems and causes the greatest money losses? A) Human errors and omissions B) Physical threats such as natural disasters C) Dishonest employees D) Computer crime

11) A power outage is an example of a(n) ________ threat. A) natural and political disasters B) software errors and equipment malfunctions C) unintentional acts D) intentional acts (computer crimes)

12) Which of the following will not reduce the likelihood of an occurrence of fraud? A) Encryption of data and programs. B) Use of forensic accountants.

C) Adequate insurance coverage. D) Required vacations and rotation of duties.

13) Gaining control of somebody's computer without their knowledge and using it to carry out illicit activities is known as A) hacking. B) spamming. C) posing. D) hijacking.

14) Which of the following is not an example of social engineering? A) Developing phony websites with names and URL addresses very similar to legitimate websites in order to obtain confidential information. B) Setting up a computer that allows the user to use a next-door neighbor's unsecured wireless network C) Using e-mail to request others into revealing their user IDs and passwords. D) Obtaining another person's credit card number without consent.

15) Which of the following would be least effective to reduce exposure to a computer virus? A) Only transfer files between employees with USB flash drives. B) Install and frequently update antivirus software. C) Install all new software on a stand-alone computer until it is tested. D) Do not open e-mail attachments from unknown senders....


Similar Free PDFs