Midterm AIS
Midterm AIS
Midterm AIS
Name: Date:
Section: Score:
2. Which of the following are objectives of the data collection activity within the general model for AIS?
a) Retrieval
b) Storage
c) Summarization
d) Deletion
b) Purchase of product
c) Cash receipts
d) Sale of inventory
5. The following are subsystems of the accounting information systems, EXCEPT the
a) Relevance
b) Precision
c) Accuracy
d) Summarization
7. When viewed from the highest to most elemental level, the data hierarchy is
a) File, record, attribute
d) Work performed by internal auditors who report to the audit committee of the BOD
10. Which of the following best describes the activities of the materials management function?
11. Which of the following best describes the activities of the production function?
12. Which of the best describes the activities of the accounting function?
a) Inventory control, cash receipts, accounts payable, cash disbursements and payroll
e) Inventory control, cost accounting, accounts payable, cash disbursements and payroll
13. Which of the following is NOT an advantage of real-time processing of files over batch processing?
15. Which is the least appropriate type of transaction for a real-time system?
a) Airline reservation
b) Point-of-sale transaction
17. A documentation tool used to represent the logical elements of a system is a(n)
b) Programming flowchart
d) System flowchart
19. Which of the following is true of the relationship between subsidiary ledgers and general ledger accounts?
b) The relationship between the two constitute part of the audit trail
d) The total of subsidiary ledger accounts usually exceeds the total in the related general ledger account
b) Mainframes are exclusive to legacy systems, while modern systems use only the client-server model
21. An example of a control designed to validate a transaction at the point of data entry is
b) A record count
c) A check digit
d) Checkpoints
a) Ethics
b) Justifiable reliance
c) Situational pressure
d) Opportunity
25. Which of the following journal entries would a bookkeeper make to conceal the theft of cash receipts from customers in
payment of their accounts?
DR CR
a) Transaction authorization
b) Supervision
c) Accounting Records
d) Segregation of duties
27. An employee in the receiving department keyed in shipment from a remote terminal and inadvertently omitted the purchase
order number. The best application control to detect this error would be a
a) Batch total
c) Completeness check
d) Reasonableness test
28. Ensuring that all material transactions processed by the information system are valid and in accordance with the management’s
objectives is an example o
a) Transaction authorization
b) Supervision
c) Accounting records
d) Independent verification
29. Providing timely information about transactions in sufficient detail to permit proper classification an financial reporting is an
example of
a) Control environment
b) Risk assessment
c) Information an communication
d) Monitoring
30. The fraud scheme that is similar to the concept of “borrowing from Peter to pay Paul” is
b) Bribery
c) Lapping
d) Transaction fraud
III. Direction: Label the elements in the diagram and briefly describe its function and key features. (20 pts.)
Prepared by:
Instructor
Approved by: