Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Accounting information systems final exam

11/11/2020 Client: arwaabdullah Deadline: 7 Days

1.

The “S” in the acronym “AIS” stands for:

A)

Standard

B)

System

C)

Symbol

D)

none of these

2.

Which of the following best describes a data warehouse?

A)

A repository of historical information from one accounting application

B)

A repository of historical information from a set of accounting applications

C)

A repository of information from many business applications—some not accounting

D)

A repository of information from many businesses in the same industry

3.

One reason why AISs fail is because:

A)

They are not computerized

B)

They try to process non-accounting data

C)

They cannot produce good information from bad data

D)

They are incompatible with the existing processing procedures

4.

The hardware of a computer system includes the computer itself and other devices that help the computer perform its tasks. These “other devices” are commonly also called:

A)

Helper equipment

B)

IT devices

C)

Peripheral equipment

D)

Secondary equipment

E)

Accessory equipment

5.

All of the following are examples of peripheral equipment except:

A)

Input equipment

B)

Output equipment

C)

Communications equipment

D)

Primary memory equipment

E)

Secondary storage equipment

6.

POS devices, bar code readers, and OCR devices are examples of:

A)

Input devices

B)

Output Devices

C)

Processing Devices

D)

Transaction Devices

7.

Printers and monitors are examples of:

A)

Output devices

B)

Input devices

C)

Processing devices

D)

Storage Devices

8.

Which type of company is most likely to use MICR?

A)

Grocery store

B)

Bank

C)

Phone company

D)

Web site seller

9.

An older computer system, typically using a mainframe, centralized data processing, and COBOL software, is often called a:

A)

Supercomputer system

B)

Primary system

C)

Legacy system

D)

Traditional system

10.

A USB drive that uses flash memory is an example of a(n):

A)

Input device

B)

Output device

C)

Secondary storage device

D)

Web device

11.

Which of the following is not an example of a source document?

A)

Receiving report

B)

Purchase order

C)

Sales order

D)

Aging report

12.

Networked enterprises and globalization have enabled a new business model called “business-without-boundaries.” Which of the following statements describes this business model?

A)

Companies no longer have all of their employees in one location

B)

It is called offshoring and companies contract with firms in other countries to do such business processes as human resources, payroll, and accounting

C)

Companies are under a great deal of scrutiny to manage costs and generate revenue so they contract with foreign firms to do various business processes at a lower cost to the company

D)

all of the above statements describe this model

13.

Hacking involves:

A)

Stealing carbons of credit cards

B)

Destroying computer hardware

C)

Gaining illegal entry to computer files from remote locations

D)

Inserting a logic bomb in a computer program

14.

A computer virus is:

A)

A disease that computer programmers are very susceptible to

B)

A small processing routine that the user accidentally introduces into the system

C)

A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves

D)

Harmless

15.

An ideal control is:

A)

A control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected

B)

A control procedure that is anticipated to have the lowest possible cost in relation to its benefits

C)

A control procedure that should always be implemented into a company's system due to the efficiency and effectiveness that will result from its implementation

D)

A control procedure that is always cost effective

16.

An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to:

A)

Utilize polygraphs

B)

Acquire arbitrage loss protection

C)

Acquire fidelity bond coverage

D)

Institute punitive management

17.

Which of the following personnel policies would be the most useful in mitigating fraud or embezzlement?

A)

Fidelity bonds for key employees

B)

Careful hiring procedures for key employees

C)

Having a Code of Conduct

D)

Required vacations for key employees

18.

Logical access to the computer system would be best controlled by:

A)

Intrusion alarm systems

B)

Complex operating systems

C)

Restrictions on physical access to online terminals

D)

Password codes

19.

All of these are reasons why databases are important to AISs except:

A)

AIS databases store valuable information

B)

Many AISs are large and therefore potentially unwieldy

C)

The databases of some organizations are very complex

D)

The hard disk space used to store AIS databases is comparatively expensive

E)

all of these are reasons why databases are important to AISs

20.

All of the following are items within the data hierarchy except:

A)

Bit

B)

Character

C)

Data field

D)

Record

E)

all of these items are part of the data hierarchy

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Paper - What can go wrong when failing to acquire morals - Practical management science excel files - Personal statement - Biome in a box - Housing options port talbot - Passive voice sentences worksheet - Cbs on virgin media - CRM Case - Contrasting local and public test blockchains - Holocaust survivors centre hendon - Features of dystopian literature - Mini paper - K line manning agency philippines - How to make xmr chart in excel - Bond order of sf6 - Current divider rule and voltage divider rule - Oncology of north shore chicago - Essentials of strategic planning in healthcare second edition - Tcs business 4.0 ppt - Sweat by hurston summary - Watt converter to amp - Cisco application visibility and control - Why did the math teacher open a window company - Differentiator with product lifecycle focus - Why did the schlieffen plan fail - A person you dislike - Difference between psychological egoism and ethical egoism - Ipc 610 vs 620 - Religion - Hollis industries produces flash drives for computers - France bringing the faith to the indians of new france - Security+ guide to network security fundamentals 6th edition pdf free - Power point - States of matter quiz - Ccc financial solutions no 2 pty ltd - Livingston company is a wholly owned subsidiary - Control Theory - System analysis and design case study answers - Order 2204815: Educaion Law: Religious Expression Case Analysis and Rationale - Thin client applications can seldom run within a computer browser - Starbucks corporation 2009 case study - 109.9 kg in stone - Gravity and inertia worksheet - Burger king vouchers uk - Journal Entry - Risk Manager in the Healthcare Setting - Prepare a diagram 0 dfd for the new system - Which of the following statements about ratios is true - Shark tank season 9 episode 1 stream - Apple bikes st annes - Data extraction table systematic review - RouteShopping - Bioecological model template - Where does simon go at the end of chapter 3 - Product life cycle theory of fdi - Why does aunt alexandra want to dismiss calpurnia - The dulac box plant produces 500 - Safaricom organizational chart - The hound of the baskervilles chapter 6 questions and answers - 12 volt led globes for caravans - Hot hand fallacy economics - Complete the company's cash budget for the upcoming fiscal year - Unspsc code list free - C++ how to program 7 e pdf - Introduction to the practice of statistics 8th edition solutions pdf - Big data analytics lifecycle ppt - Forecasting attendance at swu football games - Assignment 8 - Project quality plan template - Holes study guide pdf - Sleeping freshmen never lie plot diagram - Song lyrics with figurative language examples - Vcaa 2008 biology exam - The compound book summary - - Unguaranteed residual value lease - Rewriting limit of riemann sum as definite integral - Stagecoach vip id card - Week 6 discussion - Six big events of human evolution - When were motte and bailey castles built - Forecasting Assignment - Excel - Emerging trends in industrial relations - Life is but a walking shadow - Discussion - Cost concept and classification - Working at university health network - Building an organization capable of good strategy execution entails - Procter and gamble sources of competitive advantage - Telstra network integrity group - Issues facing America - Long term goals for nurse practitioner student - Carestream vita cr system software download - Conclusion to acid base titration lab report - Cryptic clues for christmas carols - Sas proc format cntlout - Ben and jerry's case study - Assess the link between stress and illness - Late Medieval and Renaissance