SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 60 Weeks Ago, 3 Days Ago
Questions Answered: 7570
Tutorials Posted: 7352

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Accounting Posted 03 Oct 2017 My Price 14.00

ACC 576 Week 9 Quiz

Question 1

 

An employee mistakenly enters April 31 in the date field. Which of the following programmed edit checks offers the best solution for detecting this error?

c. Reasonableness.

a. Mathematical accuracy.

b. Online prompting.

c. Reasonableness.

d. Preformatted screen.

 

Question 2

 

An input clerk enters a person’s employee number. The computer responds with a message that reads
 “Employee number that you entered is NOT assigned to an active employee. Please reenter.” What technique is the computer using?

a. Validity check.

a. Validity check.

b. Check digit.

c. Field (format) check.

d. Optical character recognition (OCR).

 

Question 3

 

In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the total credit posting?

d. The sum of the cash deposits plus the discounts taken by customers.

a. The sum of the cash deposits less the discounts taken by customers.

b. The sum of the cash deposits plus the discounts less the sales returns.

c. The sum of the cash deposits.

d. The sum of the cash deposits plus the discounts taken by customers.

 

Question 4

 

A customer’s order was never filled because an order entry clerk transposed the customer identification number while entering the sales transaction into the system.  Which of the following controls would most likely have detected the transposition?

d. Validity check.

a. Completeness test.

b. Sequence test.

c. Limit test.

d. Validity check.

 

Question 5

 

An accounts payable clerk is accused of making unauthorized changes to previous payments to a vendor.  Proof could be uncovered in which of the following places?

a. Transaction logs.

a. Transaction logs.

b. Validated data file.

c. Error reports.

d. Error files.

 

Question 6

 

Which of the following is considered an application input control?

c. Edit check.

a. Run control total.

b. Report distribution log.

c. Edit check.

d. Exception report.

 

Question 7

 

In a daily computer run to update checking account balances and print out basic details on any customer’s account that was overdrawn, the overdrawn account of the computer programmer was never printed. Which of the following control procedures would have been most effective in detecting this fraud?

c. Periodic recompiling of programs from documented source files, and comparison with programs currently in use.

a. Use of the test‐data approach by the author in testing the client’s program and verification of the subsidiary file.

b. A program check for valid customer code.

c. Periodic recompiling of programs from documented source files, and comparison with programs currently in use.

d. Use of a running control total for the master file of checking account balances and comparison with the printout.

 

Question 8

 

A brokerage firm has changed a program so as to permit higher transaction volumes. After proper testing of the change, the revised programs were authorized and copied to the production library.  This practice is an example of

d. Change control.

a. Prototyping.

b. SDLC (System Development Life Cycle).

c. Program integration.

d. Change control.

 

Question 9

 

A fast‐growing service company is developing its information technology internally.  What is the first step in the company’s systems development life cycle?

b. Analysis.

a. Testing.

b. Analysis.

c. Design.

d. Implementation.

 

Question 10

 

ABC, Inc. assessed overall risks of MIS systems projects on two standard criteria technology used and design structure. The following systems projects have been assessed on these risk criteria. Which of the following projects holds the highest risk to ABC?
 
 

Technology Structure

 

c. 

New Sketchy

 

a. 

New Well defined

 

b. 

Current Well defined

 

c. 

New Sketchy

 

d. 

Current Sketchy

 

 

Question 11

 

In a client/server environment, the "client" is most likely to be the

d. Computers of various users.

a. Computer that contains the network’s software and provides services to a server.

b. Supplier of the computer system.

c. Database administrator.

d. Computers of various users.

 

Question 12

 

There are several kinds of hardware and software for connecting devices within a network and for connecting different networks to each other. The kind of connection often used to connect dissimilar networks is a

c. Gateway.

a. Wiring concentrator.

b. Bridge.

c. Gateway.

d. Router.

 

Question 13

 

Encryption protection is least likely to be used in which of the following situations?

b. When transactions are transmitted over local area networks.

a. When financial data are sent over dedicated leased lines.

b. When transactions are transmitted over local area networks.

c. When confidential data are sent by satellite transmission.

d. When wire transfers are made between banks.

 

Question 14

 

Which of the following is usually a benefit of transmitting transactions in an electronic data interchange (EDI) environment?

d. Assurance of the thoroughness of transaction data because of standardized controls.

a. Automatic protection of information that has electronically left the entity.

b. Elimination of the need to verify the receipt of goods before making payment.

c. Elimination of the need to continuously update antivirus software.

d. Assurance of the thoroughness of transaction data because of standardized controls.

 

Question 15

 

Which of the following best defines electronic data interchange (EDI) transactions?

a. Electronic business information is exchanged between two or more businesses.

a. Electronic business information is exchanged between two or more businesses.

b. Entered sales data are electronically transmitted via a centralized network to a central processor.

c. Customers’ funds‐related transactions are electronically transmitted and processed.

d. Products sold on central Web servers can be accessed by users anytime.

 

Question 16

 

Which of the following terms refers to a site that has been identified and maintained by the organization as a data processing disaster recovery site but has not been stocked with equipment?

d. Cold.

a. Flying start.

b. Hot.

c. Warm.

d. Cold.

 

Question 17

 

Which of the following best describes a hot site?

a. Location that is equipped with a redundant hardware and software configuration.

a. Location that is equipped with a redundant hardware and software configuration.

b. Location where a company can install data processing equipment on short notice.

c. Location that is considered too close to a potential disaster area.

d. Location within the company that is most vulnerable to a disaster.

 

Question 18

 

The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the

a. Computer operator.

a. Computer operator.

b. Keypunch operator.

c. Maintenance technician.

d. Computer programmer.

 

Question 19

 

The Internet is made up of a series of networks which include

b. Gateways to allow mainframe computers to connect to personal computers.

a. Routers to strengthen data signals between distant computers.

b. Gateways to allow mainframe computers to connect to personal computers.

c. Repeaters to physically connect separate local area networks (LANs).

d. Bridges to direct messages through the optimum data path.

 

Question 20

 

A value‐added network (VAN) is a privately owned network that performs which of the following functions?

c. Route data transactions between trading partners.

a. Route data within a company’s multiple networks.

b. Provide services to send marketing data to customers.

c. Route data transactions between trading partners.

d. Provide additional accuracy for data transmissions.

 

Answers

(118)
Status NEW Posted 03 Oct 2017 05:10 PM My Price 14.00

ACC----------- 57-----------6 W-----------eek----------- 9 -----------Qui-----------z-----------

Attachments

file 1507052230-week 9 quiz.docx preview (1628 words )
Q-----------ues-----------tio-----------n 1----------- A-----------n e-----------mpl-----------oye-----------e m-----------ist-----------ake-----------nly----------- en-----------ter-----------s A-----------pri-----------l 3-----------1 i-----------n t-----------he -----------dat-----------e f-----------iel-----------d. -----------Whi-----------ch -----------of -----------the----------- fo-----------llo-----------win-----------g p-----------rog-----------ram-----------med----------- ed-----------it -----------che-----------cks----------- of-----------fer-----------s t-----------he -----------bes-----------t s-----------olu-----------tio-----------n f-----------or -----------det-----------ect-----------ing----------- th-----------is -----------err-----------or?----------- Se-----------lec-----------ted----------- An-----------swe-----------r: -----------c.-----------Re-----------aso-----------nab-----------len-----------ess-----------. -----------Ans-----------wer-----------s: -----------a.-----------Ma-----------the-----------mat-----------ica-----------l a-----------ccu-----------rac-----------y. ----------- b.----------- O-----------nli-----------ne -----------pro-----------mpt-----------ing-----------. -----------c.-----------Re-----------aso-----------nab-----------len-----------ess-----------. -----------d.-----------Pr-----------efo-----------rma-----------tte-----------d s-----------cre-----------en.----------- A-----------nsw-----------er -----------Fee-----------dba-----------ck:----------- Th-----------is -----------ans-----------wer----------- is----------- co-----------rre-----------ct.----------- A -----------rea-----------son-----------abl-----------ene-----------ss -----------tes-----------t w-----------oul-----------d n-----------ot -----------all-----------ow -----------an -----------inv-----------ali-----------d d-----------ate----------- to----------- be----------- ac-----------cep-----------ted-----------. -----------Res-----------pon-----------se
Not Rated(0)