Accounting Information System


Welcome to your Accounting Information System Quiz! Please answer the questions and submit it at the end of the quiz.

Goodluck and have fun!

Name Email Phone Number
1. Which of the following would not be found in a data dictionary entry for a data item?
2. An accounting information system in part consists of
3. All transaction cycles feed information directly into the
4. The maximum allowable account balance for a given customer is called the
5. To be effective, password must satisfy a number of requirements such as
6. Which of the following is accomplished by corrective controls?
7. Verifying the identity of the person or device attempting to access the system is
8. Data must be collected about three facets of each business activity. What are they?
9. Which area provides information to the system about hiring, terminations, and pay rate changes?
10. Transaction cycles can be summarized on a high level as "give-get" transactions. An example of "give-get" in the expenditure cycle would be
11. This determines if all required data items have been entered.
12. The person responsible for the database is the
13. During the sales order entry process, a ________ is performed to compare the quantity ordered with the standard amounts normally ordered.
14. The benefit produced by the information minus the cost of producing it.
15. When goods are being ordered from a vendor, which electronic files are either read or updated?
16. Which of the following is an example of a detective control?
17. There are three basic activities in the expenditure cycle. One of the basic activities is the receiving and storage of goods, supplies, and services. What is the counterpart of this activity in the revenue cycle?
18. When two knowledgeable people acting independently each produce the same information, this information is said to be
19. Separating the logical and physical views in a database allows the programmers to concentrate on coding the application logic
20. One of the preventive controls in a computerized environment is authentication controls.  Users can be authenticated by verifying the following except:

Be sure to click Submit Quiz to see your results!

Disclaimer: Opinions expressed in this article are that of the author and information provided are for general conceptual guidance for public information and are not substitute for expert advice. Contact for more information and if you want to avail professional services. Find us on Facebook!


What are you searching for?

Let us help you! Enter your 'search key word' to search an article / topic!