Exam 1: Introduction to AIS
Exam 1: Introduction to AIS113 Questions
Exam 2: Foundational Concepts of the AIS120 Questions
Exam 3: Fraud, Ethics, and Internal Control131 Questions
Exam 4: Internal Controls and Risks in IT Systems164 Questions
Exam 5: IT Governance142 Questions
Exam 6: Erp Systems138 Questions
Exam 7: Auditing Information Technology Bases Processes162 Questions
Exam 8: Revenue and Cash Collection Processes144 Questions
Exam 9: Expenditures Processes and Controls - Purchases128 Questions
Exam 10: Expenditures Processes and Controls Payroll and Fixed Assets137 Questions
Exam 11: Conversion Processes and Controls113 Questions
Exam 12: Administrative Processes and Controls119 Questions
Exam 13: Data and Databases148 Questions
Exam 14: Ecommerce and Ebusiness123 Questions
Select questions type
This type of database contains the data that are continually updated as transactions are processed and includes data for the current fiscal year and supports day-to-day operations is referred to as an):
(Multiple Choice)
4.9/5
(33)
Accounting software traditionally uses two different types of files.The file type that is relatively permanent and used to maintain the detailed data for each major process is an):
(Multiple Choice)
4.9/5
(37)
The process that must identify the transactions to be recorded, capture all the important details of the transactions, properly process the transaction details, and provide reports is termed the:
(Multiple Choice)
4.9/5
(33)
Which of the following is not an objective of IT enablement?
(Multiple Choice)
4.8/5
(46)
Accounting software traditionally uses two different types of files.The file type that is the set of relatively temporary records that will be process to update the permanent file is referred to as an):
(Multiple Choice)
4.7/5
(39)
A code of ethics should reduce opportunities for employees to conduct fraud if management emphasizes the cost and disciplines or discharges those who violate it.
(True/False)
4.9/5
(44)
Which of the following is least likely to be part of an accounting information system function?
(Multiple Choice)
4.9/5
(34)
Which of the following is not a risk inherent in an IT system?
(Multiple Choice)
4.8/5
(36)
Two or more computers linked together to share information and / or resources is referred to as an):
(Multiple Choice)
4.7/5
(33)
A prescribed sequence of work steps preformed in order to produce a desired result for the organization is called an):
(Multiple Choice)
4.9/5
(34)
The rethinking and redesigning that occur during business process reengineering are aided by the use of information technology.
(True/False)
4.9/5
(37)
Work steps that are internal controls within the business process would include:
(Multiple Choice)
4.9/5
(47)
Five different components of the accounting information system were presented in the textbook.Which of the following is not one of those components?
(Multiple Choice)
4.8/5
(32)
A system of local area networks connected over any distance via other net work connections is called a WAN, or wide area network.
(True/False)
4.9/5
(34)
This term refers to a system of hardware and software that captures retail sales transactions by standard bar coding.
(Multiple Choice)
4.9/5
(33)
Which of the following is not one of the corporate functions interrelated within the corporate governance system?
(Multiple Choice)
4.8/5
(38)
The COSO report, Internal Controls - Integrated Framework, identified interrelated components of internal control.Which of the following is not one of those components?
(Multiple Choice)
4.9/5
(36)
Showing 21 - 40 of 113
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)