Accounting Information System Posted on August 30, 2015 by Disclaimer | 0 Comments Welcome to your Accounting Information System Quiz!Please answer the questions and submit it at the end of the quiz. This quiz has the following properties Mode: Multiple ChoicesNumber of questions to take (from many in the database): 20 itemsOrder: Ramdon questionsScoring: 1 point each, zero-based rating!Retake: YesFollow Philippine Accounting Updates on Facebook!Goodluck and have fun! Your Name E-mail Mobile/Phone No. Agree with Privacy Policy 1. Verifying the identity of the person or device attempting to access the system is Authentication Identification Authorization Threat monitoring 2. The maximum allowable account balance for a given customer is called the credit checkpoint. reorder point. credit limit. backorder point. 3. An accounting information system in part consists of People, hardware and programs Information, programs and computers People, procedures, data, software and information technology infrastructure Internal controls and accounting records 4. Which of the following is not true about program flowcharts? Program flowcharts increase computer programmer productivity A program flowchart will exist for every computer process symbol on a system flowchart. Program flowcharts are a high level overview of all business processes. Program flowcharts document the processing logic of computer programs 5. This determines if all required data items have been entered. Completeness check Limit check Field check Range check 6. Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the expenditure cycle would be give cash, get cash. give goods, get labor. give cash, get goods. give goods, get cash. 7. Data must be collected about three facets of each business activity. What are they? the business activity, the resources it affects, the people who participate the business activity, the transactions it creates, the impact on the financial statements the inputs, outputs and processes used who is involved, what was sold, how much was paid 8. Which of the following is an example of a detective control? Physical access controls Log analysis Encryption Emergency response teams 9. When goods are being ordered from a vendor, which electronic files are either read or updated? inventory, vendors, and accounts payable vendors and accounts payable open purchase orders and accounts payable inventory, vendors, and open purchase orders 10. The benefit produced by the information minus the cost of producing it. Goal congruence Information overload Information Value of information 11. Which area provides information to the system about hiring, terminations, and pay rate changes? payroll purchasing timekeeping human resources 12. When two knowledgeable people acting independently each produce the same information, this information is said to be Complete Reliable Relevant Verifiable 13. One of the preventive controls in a computerized environment is authentication controls. Users can be authenticated by verifying the following except: something the know, such as passwords or personal identification numbers (PINs) something they have, such as smart cards or ID badges some personal information such as name, e-mail address, etc. some physical characteristics such as fingerprints or voice 14. Which of the following is accomplished by corrective controls? identify the cause of the problem correct the resulting errors modify the system to prevent future occurrences of the problem All of the above are accomplished by corrective controls. 15. All transaction cycles feed information directly into the financial statements general ledger and reporting system management reports accounting information system 16. There are three basic activities in the expenditure cycle. One of the basic activities is the receiving and storage of goods, supplies, and services. What is the counterpart of this activity in the revenue cycle? the sales order entry process the shipping function the cash collection activity the cash payments activity 17. Which of the following would not be found in a data dictionary entry for a data item? records containing a data item the source of the data item the physical location of the data the field (data) type 18. Separating the logical and physical views in a database allows the programmers to concentrate on coding the application logic by identifying physical location and layouts of various data items. since they do not have to focus on the physical location and layouts of various data items. by consolidating all data in one database. by providing pointers to data items regardless of physical location 19. One step in the systems development life cycle (SDLC) identifies the requirements users would like to see in the new system. This step is called conceptual design. physical design. implementation and conversion. systems analysis. 20. To be effective, password must satisfy a number of requirements such as Length – password should be strong and recommended to have at least 6 characters Randomness – password should consists of words found in the dictionary or name and birthday Multiple character – a mixture of uppercase and lowercase alphabetic, numeric and special characters Changed frequently – at least every 180 days All of the above Be sure to click Submit Quiz to see your results! Time is Up! Time's upClick to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Pinterest (Opens in new window)MoreClick to share on Reddit (Opens in new window)Click to share on Tumblr (Opens in new window)Click to email a link to a friend (Opens in new window)Click to share on Pocket (Opens in new window)Click to print (Opens in new window) Related