Description of this paper

Fontbonne Exam Two MAC570 Accounting Information Systems




Question;Exam TwoMAC570 Accounting Information SystemsHow You Will Be Graded:10 True-False (0.5 points each): 5 pts30 Multiple Choice (1 points each): 30 pts9 Short Answer (5 points each) 45 pts8 Take-Home Essays (15 points each): 120 ptsTotal: 200 ptsTrue / False Questions (1 point each)1. The database approach to data management is sometimes called the flat file approach.2. A lockout is a software control that prevents multiple users from simultaneous access to data.3. According to the REA philosophy, information systems should support only the needs of accounting professionals.4. Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing.5. The primary goal of installing an ERP system is achieving business process reengineering to improve customer service, reduce production time, increase productivity, and improve decision-making.6. Organizations using ERP systems employ an internal control tool called a role.7. The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.8. The rules that make it possible for users of networks to communicate are called protocols.9. All of the steps in the Systems Development Life Cycle apply to software that is developed in-house and to commercial software.10. A qualified opinion on management?s assessment of internal controls over the financial reporting system necessitates a qualified opinion on the financial statements?Multiple Choice Questions (2 points each)1. Which of the following is not a problem usually associated with the flat-file approach to data management? redundancyb.restricting access to data to the primary storaged.currency of information2. The deletion anomaly in unnormalized easily detected by usersb.may result in the loss of important datac.complicates adding records to the databased.requires the user to perform excessive updates3. Data currency is preserved in a centralized database bya.partitioning the databaseb.using a lockout procedurec.replicating the databased.implementing concurrency controls4. Which procedure will prevent two end users from accessing the same data element at the same time? lockoutd.none of the above5. A replicated database is appropriate whena.there is minimal data sharing among information processing unitsb.there exists a high degree of data sharing and no primary userc.there is no risk of the deadlock phenomenond.most data sharing consists of read-write transactions6. Which statement is NOT true? REA resources are:a.assetsb.affected by support eventsc.scarced.under the control of agents7. The ?R? in REA stands fora.ratiosb.relationshipsc.resourcesd.reserves8. The ?E? in REA stands fora.eventsb.estimatesc.economicsd.entities9. The ?A? in REA stands fora.assetsb.apportionmentc.allocationd.agents10. In an REA model, events are described from the perspective ofa.the organizationb.the designerc.the userd.the customer11. Goals of ERP include all of the following excepta.improved customer serviceb.improvements of legacy systemsc.reduced production timed.increased production12. Which of the following statements is not true?a.In a typical two-tier client server system, the server handles both application and database duties.b.Client computers are responsible for presenting data to the user and passing user input back to the server.c.In three-tier client server architecture, one tier is for user presentations, one is for database and applications, and the third is for Internet access.d.The database and application functions are separate in the three-tier model.13. Auditors of ERP systemsa.need not worry about segregation of duties.b.may feel that the data warehouse is too clean and free from errors.c.find independent verification easy.d.need not worry about system access since the ERP determines it.14. Legacy systems area.old manual systems that are still in place.b.flat file mainframe systems developed before client-server computing became standard.c.stable database systems after debugging.d.advanced systems without a data warehouse.15. The setup of a data warehouse includesa.modeling the datab.extracting data from operational databasesc.cleansing the datad.all of the above16. What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?a.LANb.decentralized networkc.multidrop networkd.Intranet17. Network protocols fulfill all of the following objectives excepta.facilitate physical connection between network devicesb.provide a basis for error checking and measuring network performancec.promote compatibility among network devicesd.result in inflexible standards18. The primary difference between a LAN and a WAN isa.the geographical area covered by the networkb.the transmission technology usedc.the type of workstation usedd.the size of the company19. the document format used to produce Web pages.b.controls Web browsers that access the used to connect to Usenet groups on the used to transfer text files, programs, spreadsheets, and databases across the a low-level encryption scheme used to secure transmissions in higher-level () format.20. An IP Address:a.defines the path to a facility or file on the the unique address that every computer node and host attached to the Internet must represented by a 64-bit data the address of the protocol rules and standards that governing the design of internet hardware and software.e.none of the above is true.21. Examples of one-time costs include all of the following excepta.hardware preparationd.programming22. Examples of recurring costs conversionc.personnel design23. A tangible benefita.can be measured and expressed in financial termsb.might increase revenuesc.might decrease costsd.all of the above24. The systems steering committee is responsible for all of the following excepta.assigning prioritiesb.determining whether and when to terminate systems projectsc.analyzing the technical feasibility of the projectd.budgeting funds for systems development25. The accountant?s role in systems analysis includes all of the following excepta.specify audit trail requirementsb.prepare data gathering questionnairesc.suggest inclusion of advanced audit featuresd.ensure mandated procedures are part of the design26. Which of the following is not an advantage of commercial software? Commercial softwarea.can be installed faster than a custom systemb.can be easily modified to the user?s exact significantly less expensive than a system developed less likely to have errors than an equivalent system developed in-house27. Which step is least likely to occur when choosing a commercial software package?a.a detailed review of the source with user groupsc.preparation of a request for proposald.comparison of the results of a benchmark problem28. The output of the detailed design phase of the Systems Development Life Cycle (SDLC) is aa.fully documented system selection reportc.detailed system design analysis report29. There is often a conflict between the attributes ofa.timeliness and concisenessb.accuracy and timelinessc.relevance and summarizationd.completeness and exceptions orientation30. Which is not true of direct data input forms?a.errors caused by transcription are reducedb.calculations are automatically performed on intelligent formsc.many data entry errors are detected and corrected immediatelyd.workers who use direct data input forms must be highly trained and skilledShort Answer Questions (5 points each)InstructionsPlease answer each question fully. These are short answer questions that require a few sentences to one paragraph to fully answer. Each response is worth 15 points.1. How does the database approach solve the problem of data redundancy?2. Define resources, economic events, and agents.3. Define ERP.4. Describe the three-tier client server model.5. What is a ping?6. Explain why accountants are interested in the legal feasibility of a new systems project.7. List three advantages and one disadvantage of commercial software.8. What is the purpose of the Request for Proposal (RFP)?9. Why should the tasks of systems development and maintenance be segregated from operations?Exam Two EssaysInstructionsPlease answer each question fully. These are essays and meant to be written in several paragraphs. Each response is worth 15 points.1. One purpose of a database system is the easy sharing of data. But this ease of sharing can also jeopardize security. Discuss at least three forms of access control designed to reduce this risk.2. Discuss the key features of Section 404 of the Sarbanes-Oxley Act.3. Does a qualified opinion on management?s assessment of internal controls over the financial reporting system necessitate a qualified opinion on the financial statements? Explain.4. Discuss the appropriate steps to take when selecting a commercial software package.5. What are network protocols? What functions do they perform?6. What is the fundamental concept behind the rule of least access? Explain why this is a potential problem in an ERP environment.7. Explain a database lockout and the deadlock phenomenon. Contrast that to concurrency control and the timestamping technique. Describe the importance of these items in relation to database integrity.8. Explain how the one-time password approach works.


Paper#37718 | Written in 18-Jul-2015

Price : $56