The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 60 Weeks Ago, 3 Days Ago |
| Questions Answered: | 7570 |
| Tutorials Posted: | 7352 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
Question 1
An employee mistakenly enters April 31 in the date field. Which of the following programmed edit checks offers the best solution for detecting this error?
c. Reasonableness.
a. Mathematical accuracy.
b. Online prompting.
c. Reasonableness.
d. Preformatted screen.
Question 2
An input clerk enters a person’s employee number. The computer responds with a message that reads “Employee number that you entered is NOT assigned to an active employee. Please reenter.” What technique is the computer using?
a. Validity check.
a. Validity check.
b. Check digit.
c. Field (format) check.
d. Optical character recognition (OCR).
Question 3
In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the total credit posting?
d. The sum of the cash deposits plus the discounts taken by customers.
a. The sum of the cash deposits less the discounts taken by customers.
b. The sum of the cash deposits plus the discounts less the sales returns.
c. The sum of the cash deposits.
d. The sum of the cash deposits plus the discounts taken by customers.
Question 4
A customer’s order was never filled because an order entry clerk transposed the customer identification number while entering the sales transaction into the system. Which of the following controls would most likely have detected the transposition?
d. Validity check.
a. Completeness test.
b. Sequence test.
c. Limit test.
d. Validity check.
Question 5
An accounts payable clerk is accused of making unauthorized changes to previous payments to a vendor. Proof could be uncovered in which of the following places?
a. Transaction logs.
a. Transaction logs.
b. Validated data file.
c. Error reports.
d. Error files.
Question 6
Which of the following is considered an application input control?
c. Edit check.
a. Run control total.
b. Report distribution log.
c. Edit check.
d. Exception report.
Question 7
In a daily computer run to update checking account balances and print out basic details on any customer’s account that was overdrawn, the overdrawn account of the computer programmer was never printed. Which of the following control procedures would have been most effective in detecting this fraud?
c. Periodic recompiling of programs from documented source files, and comparison with programs currently in use.
a. Use of the test‐data approach by the author in testing the client’s program and verification of the subsidiary file.
b. A program check for valid customer code.
c. Periodic recompiling of programs from documented source files, and comparison with programs currently in use.
d. Use of a running control total for the master file of checking account balances and comparison with the printout.
Question 8
A brokerage firm has changed a program so as to permit higher transaction volumes. After proper testing of the change, the revised programs were authorized and copied to the production library. This practice is an example of
d. Change control.
a. Prototyping.
b. SDLC (System Development Life Cycle).
c. Program integration.
d. Change control.
Question 9
A fast‐growing service company is developing its information technology internally. What is the first step in the company’s systems development life cycle?
b. Analysis.
a. Testing.
b. Analysis.
c. Design.
d. Implementation.
Question 10
ABC, Inc. assessed overall risks of MIS systems projects on two standard criteria technology used and design structure. The following systems projects have been assessed on these risk criteria. Which of the following projects holds the highest risk to ABC?
Technology Structure
c.
New Sketchy
a.
New Well defined
b.
Current Well defined
c.
New Sketchy
d.
Current Sketchy
Question 11
In a client/server environment, the "client" is most likely to be the
d. Computers of various users.
a. Computer that contains the network’s software and provides services to a server.
b. Supplier of the computer system.
c. Database administrator.
d. Computers of various users.
Question 12
There are several kinds of hardware and software for connecting devices within a network and for connecting different networks to each other. The kind of connection often used to connect dissimilar networks is a
c. Gateway.
a. Wiring concentrator.
b. Bridge.
c. Gateway.
d. Router.
Question 13
Encryption protection is least likely to be used in which of the following situations?
b. When transactions are transmitted over local area networks.
a. When financial data are sent over dedicated leased lines.
b. When transactions are transmitted over local area networks.
c. When confidential data are sent by satellite transmission.
d. When wire transfers are made between banks.
Question 14
Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment?
d. Assurance of the thoroughness of transaction data because of standardized controls.
a. Automatic protection of information that has electronically left the entity.
b. Elimination of the need to verify the receipt of goods before making payment.
c. Elimination of the need to continuously update antivirus software.
d. Assurance of the thoroughness of transaction data because of standardized controls.
Question 15
Which of the following best defines electronic data interchange (EDI) transactions?
a. Electronic business information is exchanged between two or more businesses.
a. Electronic business information is exchanged between two or more businesses.
b. Entered sales data are electronically transmitted via a centralized network to a central processor.
c. Customers’ funds‐related transactions are electronically transmitted and processed.
d. Products sold on central Web servers can be accessed by users anytime.
Question 16
Which of the following terms refers to a site that has been identified and maintained by the organization as a data processing disaster recovery site but has not been stocked with equipment?
d. Cold.
a. Flying start.
b. Hot.
c. Warm.
d. Cold.
Question 17
Which of the following best describes a hot site?
a. Location that is equipped with a redundant hardware and software configuration.
a. Location that is equipped with a redundant hardware and software configuration.
b. Location where a company can install data processing equipment on short notice.
c. Location that is considered too close to a potential disaster area.
d. Location within the company that is most vulnerable to a disaster.
Question 18
The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the
a. Computer operator.
a. Computer operator.
b. Keypunch operator.
c. Maintenance technician.
d. Computer programmer.
Question 19
The Internet is made up of a series of networks which include
b. Gateways to allow mainframe computers to connect to personal computers.
a. Routers to strengthen data signals between distant computers.
b. Gateways to allow mainframe computers to connect to personal computers.
c. Repeaters to physically connect separate local area networks (LANs).
d. Bridges to direct messages through the optimum data path.
Question 20
A value‐added network (VAN) is a privately owned network that performs which of the following functions?
c. Route data transactions between trading partners.
a. Route data within a company’s multiple networks.
b. Provide services to send marketing data to customers.
c. Route data transactions between trading partners.
d. Provide additional accuracy for data transmissions.
ACC----------- 57-----------6 W-----------eek----------- 9 -----------Qui-----------z-----------