ACC 340 Week 5 Individual Assignment Final Exam
$15.00

ACC 340 Week 5 Individual Assignment Final Exam

This Tutorial was purchased 33 times & rated A+ by student like you.

 

This Tutorial contains following Attachments

  • ACC 340 Week 5 Individual Assignment Final Exam.docx

Multiple-Choice Questions
 
1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail
 
2. Justifying expenditures for new technologies is especially difficult because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital budgeting problem
 
3. The essential steps in performing a systems study are (in order of occurrence):
a) Analysis, design, implementation and initial operation, follow up
b) Design, planning, follow up, analysis, and implementation
c) Planning, system specification, analysis, production, implementation
d) Planning, analysis, design, implementation, and follow up
 
4. What is the first step to be performed by most organizations in their accounting cycles?
a) Recording business transactions in a journal
b) Preparing a trial balance
c) Recording closing entries in a journal
d) Preparing transaction source documents
e) none of the above
 
5. Which systems study step is normally performed first?
a) Design
b) Initial operation
c) Follow up
d) Analysis
e) none of the above
 
6. The purpose of a company firewall is to:
a) Guard against spoofing
b) Assist the IETF
c) Deny computer hackers access to sensitive data
d) all of the above
 
7. The term data encryption refers to:
a) Storing data in safe places called “crypts”
b) Transforming data into secret codes
c) Scrambling data in random ways that cannot be unscrambled
d) none of these
 
8. An advantage of an extranet is that:
a) It can disseminate information corporate wide
b) It can be accessed by selected trading partners
c) Users can employ common web browsers to access information in them
d) all of the above
 
9. Another name for an Internet domain address is its:
a) URL
b) ISP
c) email address
d) IETF
 
            10.  Business process reengineering efforts sometimes fail because:
            a)   Management gets too involved in the process
            b)  Management is too optimistic regarding its expectations from its implementation
            c)   Management support can never overcome employee resistance
            d)   Employees will never accept change
 
11. The sales process begins with:
a) Placing an order with a vendor
b) A customer order for goods or services
c) Production of goods or services
d) Delivery of goods or services
 
12. The primary objective in processing revenues is to:
a) Sell as many goods as possible
b) Achieve timely and efficient cash collection
c) Maximize an organization’s sales orders
d) Only sell goods to customers who can pay their bills
 
13. An important input to the sales process is:
a) A customer sales order
b) The cash forecast
c) Aged accounts receivable information
d) A receiving report
 
14. Which of the following is not an example of a source document?
a) Receiving report
b) Purchase order
c) Sales order
d) Aging report
 
15. Inputs to transaction processing systems:
a) Are always in hard copy
b) Are best when input in a graphical format
c) May be in an electronic format when an EDI system is used
d) May never be audio
 
16.Integrated accounting software programs generally include all of the following, except:
a) Graphic reporting capabilities
b) Internet connectivity
c) One standardized chart of accounts
d) The ability to handle multiple companies
 
17. Enterprise-wide AISs:
a) Almost never pay for themselves
b) Do not include many more features than middle-range accounting software packages
c) Are seldom used by multinational organizations
d) Integrate an organization’s financial functions with its other functional areas
 
18. Training and change management activities:
a) Take place just before the go live stage of implementation
b) Are most effective when conducted throughout design, go live, and post-implementation follow-up
c) Include technical training only
d) Do not include the design of user interfaces
 
19. Which of the following software packages is not an example of a middle-range AIS?
a) Great Plains Dynamics
b) MAS 90
c) SAP R/3
d) Solomon
 
20. Many organizations purchased new AISs during the 1990’s:
a) Because of the need for Year 2000 compliance
b) Because they wanted Internet connectivity
c) In order to take advantage of opportunities for reengineering
d) all of the above 
 

Write a review

Order Id


Order Id will be kept Confidential
Your Name:


Your Review:
Rating:   A   B   C   D   F  

Enter the code in the box below:



Related Tutorials
$3.00

This Tutorial was purchased 2 times & rated B+ by student like you.

ACC 340 Week 5 Discussion Question 2 ..
$3.00

This Tutorial was purchased 1 times & rated No rating by student like you.

What is the difference between a general control and an application control? ..
$3.00

This Tutorial was purchased 2 times & rated No rating by student like you.

What is your personal involvement in determining IS requirements? ..
$3.00

This Tutorial was purchased 4 times & rated A by student like you.

What are the steps in the SDLC? Which is most important? What are the ramifications of skipping one of these steps? ..
$3.00

This Tutorial was purchased 0 times & rated No rating by student like you.

Does your firm use a DBMS? Can you tell us about it? ..
$3.00

This Tutorial was purchased 2 times & rated B+ by student like you.

What are the advantages of a relational approach to database design? What are the drawbacks? ..
$3.00

This Tutorial was purchased 1 times & rated B+ by student like you.

What are the benefits and limitations of the network being used at your organization? ..
$3.00

This Tutorial was purchased 3 times & rated A+ by student like you.

What are some of the hardware components of your PC at work? How are they different from the components of your PC at home? ..
$3.00

This Tutorial was purchased 2 times & rated B+ by student like you.

Why do some organizations continue to use both manual and computerized accounting information systems? ..
$15.00

This Tutorial was purchased 33 times & rated A+ by student like you.

Multiple-Choice Questions   1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation d) Audit trail   2. Justifying exp..
$19.00

This Tutorial was purchased 6 times & rated A+ by student like you.

1. The essential steps in performing a systems study are (in order of occurrence): a) Analysis, design, implementation and initial operation, follow up b) Design, planning, follow up, analysis, and implementation c) Planning, system specification, analysis, production, implementation d) Planning..
$9.00

This Tutorial was purchased 3 times & rated A+ by student like you.

Prepare a 700- to 1,050-word article summary about a recent data breach or computer fraud at an organization to include the following: • Describe the circumstances involved and the results of the event. • Explain how the data breach occurred and what could have been done to prevent the breach/fra..
$9.00

This Tutorial was purchased 4 times & rated A by student like you.

Prepare a 700- to 1,050-word paper to include the following: • Describe the various types of enterprise wide accounting systems used in organizations. • Explain how you might use the information system development process to implement a new system for your organization. • Discuss the steps invo..
$5.00

This Tutorial was purchased 3 times & rated A+ by student like you.

1. The Certified Information Technology Professional is the position created by the AICPA to recognize CPAs who have the ability to provide skilled professional services on Information Technology. True False 2. The correct order of effects in the value chain are: Inbound Logistics → Operat..
$9.00

This Tutorial was purchased 8 times & rated A by student like you.

Write a response of no more than 1,050 words to Problem 6 from Ch. 1, "Accounting Information Systems and Firm Value" of Accounting Information Systems. Click the Assignment Files tab to submit your assignment. Using the accompanying explanations of each IT strategic role, suggest the appropriat..
$7.00

This Tutorial was purchased 4 times & rated A+ by student like you.

Use your selected business activity from Week 2. Design at least two relational database tables. Identify the primary keys and foreign keys for your tables. Determine the reports you would create to assist management evaluate and monitor the business process. Identify the relationships (using k..
$7.00

This Tutorial was purchased 4 times & rated A by student like you.

Select a company that you are familiar with to use as the basis for your assignment. Select a business activity in your selected company. For example, the sales activity, the accounting activity, the manufacturing activity, the hiring activity, etc. Prepare a 10- to 12-slide presentation to inclu..
$5.00

This Tutorial was purchased 3 times & rated A+ by student like you.

1. Control Objectives for Information and related Technology's (CobIT) guidance is guided by a structure that corresponds to the SDLC, namely: Plan and Organize, Acquire and Implement, Deliver and Support and Monitor and Evaluate. True False 2. While hierarchical and netwo..
$9.00

This Tutorial was purchased 3 times & rated A+ by student like you.

Write a response of no more than 1,050 words to Problems 1 and 2 from Ch. 13, "The Balanced Scorecard and Business Value of Information Technology" on pp. 272 of Accounting Information Systems. Click the Assignment Files tab to submit your assignment. 1. Select a prominent public company, such as ..
$5.00

This Tutorial was purchased 3 times & rated A+ by student like you.

1. Investments in business analytics systems support the balanced scorecard management process during the Link to Operations step. True False 2. The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends th..
acc340 © 2017 All Rights Reserved.Powered by:Webzindagi