Preview

Accounting Information Systems: Test Review

Good Essays
Open Document
Open Document
997 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Accounting Information Systems: Test Review
ACIS 3504 TEST 2 REVIEW

graphical representation of information narrative when preparing a document flowchart, the names of organizationl departments or job functions should appear in the column headings all of the following are guidelines for preparing data flow diagrams except show the most detail in the highest level DFD the passage of the Sarbanes oxley act all of the above which of the following is not a true statement data flow diagrams and flowcharts are difficult to prepare and revise using software packages in preparing a DFD, when data are transformed through a process, the symbol used should be a circle in a data flow diagram of the customer payment process, update receivables will appear above or in a circle most processes on a DFD can be identified by data flows both into or out of a process a DFD created at the highest level or summary view is referred to as a context diagram

Why do many fraud cases go unreported and unprosecuted?
All of the above
Downloading a master list of customers and selling it to a competitor is an example of?
Data fraud
Which of the following will not reduce the likelihood of an occurrence of fraud?
Encryption of data and programs
Use of forensic accountants
Required vacations and rotation of duties
Adequate insurance coverage

A part of a program that remains idle until some date or event occurs and then is activated to cause havoc in the system is a
Logic bomb
Virus
Data diddle
Trap door
The unauthorized copying of compay data is known as
Eavesdropping
Masquareading
Phishing
Data leakage
Computer fraud perpetrators who use telephone lines to commit fraud and other illegal acts are typically called
Phreakers
Hackers
Jerks
Crackers
Tapping into a communications line and then entering the system by accompanying a legitimate user without their knowledge is called
Data leakage
Piggybacking
Hacking
Superzapping
Spyware is
Software that monitors whether spies

You May Also Find These Documents Helpful

  • Powerful Essays

    The path that data follow in an AIS, for example from manual source document to completed output report, is called an audit trail.…

    • 2786 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Sm C102 Quiz #2

    • 650 Words
    • 3 Pages

    Correct Question: A process flowchart uses symbols to represent which of the following? Your Answer: Flows of material or customers…

    • 650 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Theo 104 Quiz

    • 569 Words
    • 3 Pages

    A data flow diagram represents a physical, rather than logical, view of an accounting information system.…

    • 569 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    4. It is a program in which malicious or harmful code is disguised inside some apparently harmless programming or data.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Edu Calender

    • 355 Words
    • 2 Pages

    Data flow DF5 should not move directly from source E1 to data store DS1 without first going through a process.…

    • 355 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Process and design identifies the processes and the roles that are involved. Processes represent the operations performed by the system. Entities represent all the information sources of the system. We represent the entities and the processes in the data flow diagrams, DFD. While designing the DFD’s we increase the level of detail with each level. At each level the process divides into sub-processes until indivisible sub-processes are reached. Here is an example.…

    • 637 Words
    • 3 Pages
    Good Essays
  • Good Essays

    B. Match the following data display tools with their descriptions. (Descriptions may be used more than once or not at all.)…

    • 460 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Petrie's Electronic

    • 321 Words
    • 2 Pages

    1. Are the DFDs in PE Figures 6-1 and 6-2 balanced? Show that they are, or are not. If they are not balanced, how can they be fixed?…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 2

    • 475 Words
    • 4 Pages

    In the statement below, identify which aspect of the DFD is represented by the underlined part:…

    • 475 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Supply Chain Management

    • 1645 Words
    • 7 Pages

    In the San Diego distribution center (DC) information flow example, dealers not being notified automatically of order status would be classified as which of the following information flow dimensions:…

    • 1645 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Evaluate the accounting system and identify areas for improvement. 1.1 Identify an organisation’s accounting system requirements. 1.2 Review record keeping systems to confirm whether they meet the organisation’s requirements for financial information. 1.3 Identify weaknesses in and the potential for improvements to, the accounting system and consider their impact on the operation of the organization. 1.4 Identify potential areas of fraud arising from lack of control within the accounting system and grade the risk. 1.5 Review methods of operating for cost effectiveness, reliability and speed.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3. Path of a transaction through a data processing system from point of origin to final output, or backwards from final output to point of origin…

    • 872 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    fraud, which secretly contacts wireless messaging services that impose steep fees on a monthly bill…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays