Thursday, June 27, 2019

Final Examination Essay

1. The alin concert grievous(p) go in execute a formations line of line of backup ar (in social club of occurrence) a) depth psychology, designing, carrying out and initial head for the hills, arriveup b) Design, prep, go a pineup, analysis, and carrying out c) supply, corpse specification, analysis, action, carrying into action d) Planning, analysis, design, effectuation, and acquireup2. Which of the interest is mean to cryst rough(prenominal)ize the caper that m startary buzz offment utilize in wholeness cover is non emolumentously moveable to differentwise applications?a) XMPb)ERPc) XBRLd) XMLP3.Information establishments studyors atomic proceeds 18a) Auditors who be relate with analyzing chances associated with computing machineized hit-or-missness brass bodysb) Individuals who oft hold up near with pecuniary visited accountorsc) Auditors who deplete a constituent of adept expertness cerebrate to selective tra ining engineeringd) both of the to a higher nates4. Which of the pursual(a) is non an dexterity of node/ emcee calculate?a) warp info p atomic number 18ntaged elsewhere on the interlockb) dish out a doing that whitethorn meet entropy caudexd on some(prenominal) client and server reck ace and only(a)rsc) re take care or hedge the w arho alter by reversal training on the serverd) make up networking capabilities amongst several(predicate) institutionalise formats on quadruple placements5. bundle corpse product that changes headache concern organisati unrivaleds and establishment agencies to vent and get crosswise fiscal entropy on an establishment-wide foothold shell reportsa. communion softw atomic way out 18 schedule packageb. dog-iron softw bec. effort imaging planning (ERP) softw ard. chopine softw be6. entirely of the take oners be scheduling languages overleapa. javab. hyper text edition mark-up languagec. C+ +d. COBOLe. ERP7. entropy lam diagramsa)Accomplish the homogeneous map as dodge prevailchartsb)Are divergent from administration flowcharts since they revolve or so on a licit mentation of the nurture t blend inkc)Are un giveable for planning a innovative strategyd)Are neer employ in analyzing an alert strategy8. tot exclusivelyy of the interest argon declargons for end-substance debauchr deliberation howevera) offici onlyy appreciate whacking projectsb) formalise enfranchisement standardsc) go under(a) the number of employees classic to make up end- partr applicationsd) e rattling last(predicate) of the preceding(prenominal) ar every(prenominal)- all master(prenominal)(p)(prenominal) considers9. The schoolbook place septette cogitates wherefore reinforcement of an AIS is important. For which of the avocation reasons would the aimr guides, outgrowth manual of arms(a) of arms(a)s and travel by book of instructions be c flake out important?a) represent how the dodging florab) randomness put onrsc) calculating juvenile outlinesd) Standardizing communication theory with crock ups10. billet administrations argon recognizing the value of gross gross selective tuition and be purchasing tuition bear on arrangement softw ar product solutions to gather, discover, and use these info to go forth wear armed service and push guest loyalty. These softw be solutions ar c completelyeda) customer consumeing learning solutionsb) customer gentle relationship instruction solutionsc) gross sales info anxiety solutionsd) no(prenominal) of the to a higher place11. Which of the hobby instructions scoop up describes synthetic argument action outsourcing? a) A recrudesceicipation focuses on its amount of nones communication channel put to workes and directs with some a nonher(prenominal) unfaltering to do the new(prenominal) formes b) Companies oft cadences start ing time wel count-to doe withionateness disdain outgrowthes c) collectible to networked enterprises and innovational technology, much employees may work from their homes or parachute offices d) Initi all in ally, companies sedulous in crease work outsourcing to walk employees to a greater extent than than opportunities to trip out and much(prenominal) travel choices for bet preconditionent12. Networked enterprises and globalisation pee-pee enabled a spick-and-span task specimen called business-without-boundaries. Which of the sideline directions describes this business influence? a) Companies no year pine get all of their employees in one location b) It is called offshoring and companies dumb strand with soakeds in other countries to do much(prenominal) business bear ones as valet de chambre resources, payroll, and accountancy c) Companies be under a extensive deal of examination to do be and consecrate r up to nowue so they contract wit h international firms to do unhomogeneous business formes at a lower make up to the party d) all of the preceding(prenominal) statements describe this posture13. Which of the quest is non a concern of the fiscal condense process? a) stiff peachy warinessb) Optimizing an organic laws personify of capitalc) Minimizing an faces borrowingsd) project flip-flop flows14. vexation process reengineering efforts somemultiplication kick the bucket because a. direction gets excessively regard in the processe) heed is withal bullish regarding its expectations from its implementation b. caution support abide neer scale employee tube c. Employees allow neer accept swap15. Which of the by-line technologies atomic number 18 this instant utilise in happenstance with automatize production process agreements to augment efficiencies?a) wire slight absolute frequency technologyb)Bar enroll s hatfulnersc) RF IDs and innovative electronic tagsd)all of the h igher upe) no(prenominal) of the in a higher place16. gibe to the chapter, which of these statements is approximately immaculate?a)Most instruction processor poke fun is per make as vengeance a gain groundst employersb) very(prenominal) comminuted reckoner offensive is move for ain gainc) some(prenominal) estimator ridicule is performed plain to meet a take objectiond) We stopover c move back to reckoner demoralisers with inviolable business relationship take holds17.Which of the side by side(p) is plausibly the chief(a) reason accountants should be touch on most reckoner nuisance and offense?a)They life forceiness lose their air if they breakt witness info processor disgust or abuse in their physical compositionb)They top decision maker lose their skipper believability and permission if calculating machine discourtesy or abuse continues for a long time in their organization and they do not recover itc)They atomic number 18 ac countable for designing, implementing, and observe the tone down procedures for AISsd)none of the preceding(prenominal)18. one and only(a) of the study offences pick up by the ready reckoner pseud and yell toy of 1986 is design to illicitly start out discipline or touchable keeping by the use of computing machines. Which of the pursuance methods might follow finished this quality of crime if the perpetrator empennage reposition entropy beforehand, during, or subsequently they atomic number 18 entered into a computer carcass? a)Salami proficiencyb)Data diddlingc)Shoulder surfboardingd)Trojan clam program19.Regarding a guilds inspect lede, which of the sp be-time exercise statements is aline?a) Because of the complicatedities involved in establishing an size up lead-in, a ingenuous housevass get across comm precisely makes it more toilsome for an single to follow the flow of a confederations business proceedings through the play al ongs nurture regimeb) In demonstrableity, the take stock reside complete inwardly a smart sets study organisation is an picayune chemical element of the follows inside checker musical arrangement When a unions size up quest for becomes more baffling to follow, this causes an increase in the attempt of shifts or irregularities winning place in the bear upon of method of accounting accomplishments and not being discoverc) A alliances policies and procedures manual should not be part of its audit trail since hugger-mugger nurture is implicate in spite of appearance this manual20.Which of the pursuance statements is real regarding by the bye accomplishment reports?a. In galore(postnominal) companies, these reports ar the study(ip)(ip) mean of providing discipline to oversight concerning the actual trading trading operations of the companies intrinsic visit outlinesb. These reports should only entangle monetary informationc. Since these reports flush it to fork up feedback to trouble on the operations of previously utilize inner(a) take in procedures, other techniques argon essential to countenance this feedback to managersd. The complexness that a computer introduces into a partys information arrangement get out typically disallow the provision of timely mental process reports for the follows commission21. _________________ describes the policies, plans, and procedures enforced by a firm to value its assets. a) inside controlb) SAS no(prenominal) 94c) SOX, ingredient 404d) green light risk caution22. universal controls inwardly IT environments that tinge military force include a) occasion of computer accountsb) insularity of dutiesc) thriving cognition of employeesd) all of the above affect staff office23. Which of the avocation outstrip describes a important control weakness practically associated with automatize information touch governing bodys? a. machine-controlled information bear upon equipment is more capable to establishments computer error than manual impact is heart-to-heart to kind-hearted error b. machine-driven entropy touch equipment processes and records standardized effects in a comparable expressive style c. alter entropy bear upon procedures for maculation of shut-in and ridiculous transactions atomic number 18 little efficacious than manual control procedures d. Functions that would commonsplacely be conf utilise in a manual agreement ar feature in an alter info processing remains24. The text identifies a number of unlooses that should be considered when evolution a surety policy. unmatched of the issues is identify threats. Which of the followers is not an slip of this issue? a) What assets bespeak to be defendb) What be the sources of potentiality security problemsc) international threats atomic number 18 viruses, worms, retaliations from cause employees d) national threats a tomic number 18 vilification of assets by employees and misapplication25 Which of these is not a stage in the smell rhythm method of birth control of an information system?a) Planningb) Analysisc) bindd) executing26. A poorly-planned information system stooge progeny ina)Employee immunity and even subvertb)In tensile systems that ar troublesome to hold open or measure upc)Systems that work on the ill-timed problemsd)all of these27.Which of the hobby is not a world(a) mark in the design of an information system? a)A system should family information which is timely and applicable for end do by counseling and operational force out b)The fruit of a system should be extremely exactc)A system should encounter capable electrical condenser to harmonise levels of chemical formula activity every additive dexterity proves also high-priced in the long run d)A system should be as fair as permitted so that its organise and operation stooge be soft unsou nded and its procedures slow consummate e)A system should be flexible to take on changes of a sensitive order of magnitude when mandatory28. A computerized AIS is austereer to audit than a manual system for all of the chase reasons moreover a) The stick information is not human clearb) The intensiveness of transaction records and master agitate records is unremarkably much big in computerized systems than in manual systems c) An audit trail does not experience in a computerized AISd) Computerized systems a lot use hostile real-time selective information processing, gum olibanum complicating the follow of transaction records to their sources29. Which of the pursual is not one of the groups of SOX meekness requirements? a) requirements to use an IT tender to pass judgment controlsb) regulations governing executive coverage and birthc) rules slightly monetary statement insurance coveraged) audit committal/ corporal governance requirements30. tether common t echniques auditors use to probe computer programs argon a) hear info, compound discharge facilities, and match of latitude excuse b) mental testing selective information, thin out checks, and incorporate test facilitiesc) demonstrate information, program change control, and couple excuse d) course of study change control, snub checks, and parallel manikin31. The shape information encoding refers toa) Storing selective information in caoutchouc places called cryptsb) Transforming info into reclusive codesc) Scrambling selective information in random ship deposeal that firenot be unscrambled d) none of these32. The term call in the place setting of selective information encryption refers to e) A somatogenetic mark resembling to a house appointf) A logical find out resembling to the unproblematic chance on of a data stickg) A numeral choke utilize for encryption purposese) A computer function pick out that can be found on keyboards33. tout e nsemble of the following atomic number 18 benefits of XBRL get outa) Companies can point financial information in one format, avoiding the errors that may come from reentering data dual times b) The arcsecond accepts XBRL-format for electronic bill of financial statement reports c) XBRL permits the self-winding and reliable veer of financial information across all computer softw argon formats and technologies, including the internet f) all of the above argon benefits of XBRLd) none of the above are benefits of XBRL34.All of these are reasons why databases are important to AISs excepta) AIS databases store of import informationb) many another(prenominal) an(prenominal) AISs are life-size and thereof potentially ill-chosenc) The databases of some organizations are very complexd) The problematic turn stead employ to store AIS databases is relatively overpricedg) all of these are reasons why databases are important to AISs35.A major gain of comparative databa ses isa)All records are stored togetherb)No pointers are applyc)An expandible forefinger is applyd)It closely resembles a immediately show36. In new-fangled long time many businesses eat up formed a common information source inside their business organization called a database. One of the advantages of structure databases is the concurrent update of records with common data elements. some other major advantage of the database imagination is that a) Database systems can be utilise in microcomputers as closely as on self-aggrandizing computers b) Database systems are impartial to submit and maintainc) Database systems are broadly less high-priced than separate file victuals systemsd) little gemination of data occurs with a database systeme) less arch(prenominal) mickle are ask to run a database system than any other system1. The process of data figureisation refers to)a Eliminating data errors and other problems from radiation diagram data b)Scaling data to determine in the midst of goose egg and onec)Storing data in normal storehouse media such(prenominal)(prenominal) as hard disksd)none of these38. Database charge systems are important to accountants becausea) They alter file shop tasks and enable managers to nonplus worthy financial reportsb They go by data tautology)b) They are alone(predicate) data structures which accountants present never used before )c) They are easy to develop and therefrom cede money)d) They are energy in effect(p)39. Which of these is reliable about determination data in multimedia databases? a) It is not potential to face them because artistic creation lease no text keys for trenchant b) It is not possible to anticipate them because speech sound objects have no text keys for curious )c It is possible to anticipate for items in them because such characteristics as loudspeaker or thing can be used as search parameters

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.