Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Accounting information systems final exam

11/11/2020 Client: arwaabdullah Deadline: 7 Days

1.

The “S” in the acronym “AIS” stands for:

A)

Standard

B)

System

C)

Symbol

D)

none of these

2.

Which of the following best describes a data warehouse?

A)

A repository of historical information from one accounting application

B)

A repository of historical information from a set of accounting applications

C)

A repository of information from many business applications—some not accounting

D)

A repository of information from many businesses in the same industry

3.

One reason why AISs fail is because:

A)

They are not computerized

B)

They try to process non-accounting data

C)

They cannot produce good information from bad data

D)

They are incompatible with the existing processing procedures

4.

The hardware of a computer system includes the computer itself and other devices that help the computer perform its tasks. These “other devices” are commonly also called:

A)

Helper equipment

B)

IT devices

C)

Peripheral equipment

D)

Secondary equipment

E)

Accessory equipment

5.

All of the following are examples of peripheral equipment except:

A)

Input equipment

B)

Output equipment

C)

Communications equipment

D)

Primary memory equipment

E)

Secondary storage equipment

6.

POS devices, bar code readers, and OCR devices are examples of:

A)

Input devices

B)

Output Devices

C)

Processing Devices

D)

Transaction Devices

7.

Printers and monitors are examples of:

A)

Output devices

B)

Input devices

C)

Processing devices

D)

Storage Devices

8.

Which type of company is most likely to use MICR?

A)

Grocery store

B)

Bank

C)

Phone company

D)

Web site seller

9.

An older computer system, typically using a mainframe, centralized data processing, and COBOL software, is often called a:

A)

Supercomputer system

B)

Primary system

C)

Legacy system

D)

Traditional system

10.

A USB drive that uses flash memory is an example of a(n):

A)

Input device

B)

Output device

C)

Secondary storage device

D)

Web device

11.

Which of the following is not an example of a source document?

A)

Receiving report

B)

Purchase order

C)

Sales order

D)

Aging report

12.

Networked enterprises and globalization have enabled a new business model called “business-without-boundaries.” Which of the following statements describes this business model?

A)

Companies no longer have all of their employees in one location

B)

It is called offshoring and companies contract with firms in other countries to do such business processes as human resources, payroll, and accounting

C)

Companies are under a great deal of scrutiny to manage costs and generate revenue so they contract with foreign firms to do various business processes at a lower cost to the company

D)

all of the above statements describe this model

13.

Hacking involves:

A)

Stealing carbons of credit cards

B)

Destroying computer hardware

C)

Gaining illegal entry to computer files from remote locations

D)

Inserting a logic bomb in a computer program

14.

A computer virus is:

A)

A disease that computer programmers are very susceptible to

B)

A small processing routine that the user accidentally introduces into the system

C)

A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves

D)

Harmless

15.

An ideal control is:

A)

A control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected

B)

A control procedure that is anticipated to have the lowest possible cost in relation to its benefits

C)

A control procedure that should always be implemented into a company's system due to the efficiency and effectiveness that will result from its implementation

D)

A control procedure that is always cost effective

16.

An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to:

A)

Utilize polygraphs

B)

Acquire arbitrage loss protection

C)

Acquire fidelity bond coverage

D)

Institute punitive management

17.

Which of the following personnel policies would be the most useful in mitigating fraud or embezzlement?

A)

Fidelity bonds for key employees

B)

Careful hiring procedures for key employees

C)

Having a Code of Conduct

D)

Required vacations for key employees

18.

Logical access to the computer system would be best controlled by:

A)

Intrusion alarm systems

B)

Complex operating systems

C)

Restrictions on physical access to online terminals

D)

Password codes

19.

All of these are reasons why databases are important to AISs except:

A)

AIS databases store valuable information

B)

Many AISs are large and therefore potentially unwieldy

C)

The databases of some organizations are very complex

D)

The hard disk space used to store AIS databases is comparatively expensive

E)

all of these are reasons why databases are important to AISs

20.

All of the following are items within the data hierarchy except:

A)

Bit

B)

Character

C)

Data field

D)

Record

E)

all of these items are part of the data hierarchy

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Writer Writer Name Offer Chat

Writers are writing their proposals. Just wait here to get the offers for your project...

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Discussion "What do you think are different between men and women sexuality? - Essay on Discrete Classifiers - Op - Simcity 3000 best layout - The blind side chapter 10 summary - Criteria for weighted scoring model - Advocacy and opposition rybacki & rybacki 7th edition pdf - Army training centre pirbright - Simplify each radical expression use absolute value symbols - Aldridge traffic controllers pty ltd - Harmonizer is a maintenance role in groups - Kepner tregoe decision analysis example - Operational amplifier circuits lab report - Brave new voices poems lyrics - How to analyze a song for english class - The two internal dimensions represented on the axes of the space matrix are - Ge ecomagination criticism - Mcdonalds diversification strategy - La camarera / servirte / huevos fritos y café con leche - Dulce et decorum est annotated - Hawthorn drive surgery ipswich opening times - Cisco pix firewall price - Pamela reed's theory of self transcendence - Arabic - Fst 7 bodybuilding com - Costco business model analysis - First class welder certificate - Leverline soap dispenser refill - Complementary strand of dna - Purnell cultural competence - Joseph and diana cohen live in pleasantville new jersey - What are the two basic functions used in encryption algorithms - Nc date on food - CSCI 457 Assignment 2 – Hexadecimal Calculator - Don t burn the candle at both ends story narration - The resistible rise of arturo ui script pdf - Case study of pepsi company pdf - Fundamental forces of nature ppt - Cybersecurity - L oreal masters multiculturalism - Incomplete dominance and codominance practice problems - Matlab random number generator - Gsk annual report 2010 - A study with questionable sponsorship or motives - Case study introduction sample - Alpha beta charlie delta echo - Elementary Calculus - And the band played on dvd - HA575 Unit 9 Discussion - Diploid and haploid worksheet answers - Electron configuration for al3+ ion - Difference between academic text and non academic text - Image Analysis - Children and their development 7th edition pdf free - According to zinn what is his main purpose for writing - 107nrwk3obj - Dublin west education centre - Keynows - Boolean algebra sop to pos conversion - Watt a 2019 project management 2nd edition bccampus open education - Dell computer questions and answers - Biological theories of crime - All shook up glenn altschuler pdf - Advance Phisyology (Due 2 hours) - Types of historical lenses - Essay Knowledge, Expert and Content management systems - Secret harbour surf club - The cask of amontillado thesis statement - Engineering mechanics statics 12th edition solutions chapter 5 - Prepare a classified balance sheet - Briefly describe how supportive and interpersonal psychotherapies are similar - Transitional Care Application: Roles and Organizational Structure - Charlton marshall parish council - Oral presentation marking rubric - What is aviation security identification card - Solenoid switch electrical symbol - Boeing fortune 500 rank 2019 - Configuring and verifying standard acls - What is the mass of 3.45 moles of aluminum sulfate - Unit conversion worksheet 1 answer key - movie reflection - NTC/302: Network Web Services - Discussion W4 - Read theory reading comprehension 1 - Mean value theorem error approximation - Bottling industry five forces analysis - Scientific method pill bug lab - Homework - Master and commander map - It suggests glibness is something with pros and cons - The ledger of mai company includes the following accounts - Describe the stages of development of an ordinary cell thunderstorm - Of oceanic trenches zone crossword clue - 8/3-1 benchmark - Cpt code for removal of foreign body from ear lobe - Journal Artical Review - A primer on communication studies v 1.0 - CMST 303 Project 4 - Discussion Question 1 week 4 - Hotels near turnip rock - Eachs head start petersburg wv