Details of this Paper

final Exam AIS




Question;A general rule that should be followed when developing control procedures for acompany's assets is:The cost of the control procedure will likely exceed the procedure's benefitThe procedure should not be designed and implemented unless an asset's cost exceeds$5,000The more liquid an asset is, the greater the risk of its misappropriationThe procedure should not be designed and implemented in situations where a riskassessment has been previously performed2.Assume that a company designs and implements a control procedure whereby theaccountant that is responsible for recording cash receipts transactions does not have accessto the cash itself. This control procedure is an example of a:Detective controlPreventive controlCorrective controlFeedback control3.Regarding the cost?benefit concept, which of the following statements is true?A)Every control procedure that offers benefits toa company should be implemented into thecompany's systemB)An optimal internal control package isdeveloped for a company's system byimplementing a standardized package ofcontrol proceduresC)A control procedure is considered costeffective if it can be determined that the cost ofoperating the procedure will be cheaper in thecurrent period compared to the previous periodD)A control procedure is considered costeffective when its anticipated benefits exceedits anticipated costs4.23. A student fails a course at his university. Which of these is most likely to be the causeof the problem and not a symptom of this problem?A)An angry studentB)The student gets placed on probationC)The student's mother pays an angry visit to thedean of studentsD)The student did not study for the course5.26. Which of these is true when designing control procedures for a computer system?A)B)C)D)6..A)B)C)D)E)Control procedures are irrelevantControl procedures should be designed andimplemented after the proposed system isfunctioning properlyControl procedures should be built into thesystem as it is designedControl procedures should be implementedregardless of their costsWhen designing a computer based information system, the initial step in the systemsdesign process is to determine:The required outputsThe source documents which serve as the basisfor inputThe processing requiredThe computers that will be usedThe file information required duringprocessing7.All of these are types of record keys except:A)Primary record keyB)Secondary record keyC)Tertiary record keyD)Foreign record key8.All of these are database structures except:A)HierarchicalB)NetworkC)StarD)Relational9.This type of database structure enables users to create relationships after the database has beencreated and implemented:A)HierarchicalB)NetworkC)StarD)Relational10.In the REA framework, a database designer should create a ____ for each entity.A)RecordB)TableC)Secondary keyD)all of these11.The reason why database designers normalize data is:A)To eliminate data errorsB)To scale data properlyC)To create backup copies of dataD)To create efficient database tables12.An example of a transitive dependency in a database is:A)Student? gradeB)Telephone area code? phone numberC)Airline? flight numberD)Parking Code? parking fine13.You are defining a database table. Which of the following best explains why you wouldassign a Social Security number field as a text field?The field will not be manipulated mathematicallyThis is the default data type for most DBMS table fieldsThe field is too long to define as a numerical fieldYou plan to use this field as a primary key, which must therefore be a text field14.One purpose of a data manipulation language is to:A)Create data fieldsB)Define the record structureC)Create queries on the dataD)all of these


Paper#41733 | Written in 18-Jul-2015

Price : $19