Five different components of the accounting information system were presented in the textbook.
Which of the following is not one of those components? correct answers Work steps to assure
that all business processes are recorded using computer-based procedures.
The process of searching data within the data warehouse for identifiable patterns that can be used
to predict future behavior is referred to as: correct answers Data mining
The intercompany, computer-to-computer transfer of business documents in a standard business
format is called: correct answers Electronic data interchange
IT controls can be divided into two categories. Which of the following is a correct statement of
one of those categories? correct answers Application controls are used specifically in accounting
applications to control inputs, processing, and output.
Which of the following is not a part of risk analysis? correct answers Risk management
Which of the following is not a main characteristic of client-server system? correct answers The
client does not participate in the processing or data manipulation.
After the accounting information has been input into the accounting system, it must be
processed. Process accounting data involves: correct answers Calculations, classification, and
summarization
The disadvantages to real-time processing include: correct answers The single database that is
shared is more susceptible to unauthorized access.
When creating or reading a system flowchart, the triangle symbol represents a: correct answers
File
, This document system is a pictorial representation of the logical structure of databases. It
identifies the entities, the attributes of the entities, and the relationship between the entities.
correct answers Entity Relationship Diagram
The objectives of an internal control system include all of the following except: correct answers
Maintain ongoing education
The category of control activities referred to as segregation of duties requires that certain
activities should be the responsibility of different person or department. The three duties that are
to be separated are: correct answers Authorizing, recording, and custody
The existence of verifiable information about the accuracy of accounting records is called a(n):
correct answers Audit trail
In response to the need for internal controls above and beyond what was described by COSO, the
Information Systems Audit and Control Association developed an extensive framework of IT
controls entitled: correct answers Control Objectives for Information Technology (COBIT)
The risk related to this category of Trust Services Principles could be inaccurate, incomplete, or
improperly authorized information. correct answers Processing integrity
Which of the following statements is not true? correct answers Business processes categorized as
expenditure processes are not intended to be processes that serve customers.
In a manual system, adjusting entry would most likely be initially recorded in a correct answers
general journal
Which of the following is not a disadvantage of maintaining legacy systems? correct answers
They contain invaluable historical data that may be difficult to integrate into newer systems.