Accounting Information System: Midterm and Final Exam
Accounting Information System: Midterm and Final Exam
Accounting Information System: Midterm and Final Exam
Submitted to:
Mr. Rhamir C. Dalioan
Submitted by:
Sellon, Lea Grace A.
Soriano, Kristine Andrea M
Nucasa Ma. Isabel M.
Saragosa, Chastine
Impas, Key S.
Masire, Mofidah
TABLE OF CONTENTS
PAG
E(s)
PART I. Multiple Choice Theories
General controls and application Controls…………………………………………….5-6
By Key S. Impas
Parallel Simulation……………………………………………………………………..18-19
By Kristine Andrea M. Soriano
Isabel Nucasa
Bus Topology
By Chastine Saragosa…………………………………………………………….27-28
Star Topology
By Chastine Saragosa…………………………………………………………….29-30
2
Ring Topology
By Lea Grace A. Sellon…………………………………………………………….31-32
Tree Topology
By Ma.Isabel Nucasa… …………………………………………………………….33-34
Mesh Topology
By Kristine Andrea M. Soriano…………………………………………………….35-36
Parallel Simulation……………………………………………………………………….43-44
By Kristine Andrea M. Soriano
Isabel Nucasa
3
Bus Topology
By Chastine Saragosa…………………………………………………………….48
Star Topology
By Chastine Saragosa…………………………………………………………….49
Ring Topology
By Lea Grace A. Sellon…………………………………………………………….50
Tree Topology
By Ma.Isabel Nucasa… …………………………………………………………….51
Mesh Topology
By Kristine Andrea M. Soriano…………………………………………………….52
4
PART I
Multiple Choice Questions
General controls and application controls
1. Regarding accounting systems, what is the auditor most likely to understand and
evaluate?
3. Which one of the following is NOT a relevant factor in assessing the control risk of a
computerized environment?
A The computer operator should not have access to programs or data except for
authorized purposes.
B Programmers test new developments on live data.
C Database administrators are allowed to maintain the data.
D Internal auditors are not allowed to test changes to software.
5
B input of data into the payroll application.
C controlling access to accounting programs.
D maintaining application servers.
6. The control structure over program changes should include control procedures that
are sufficient to ensure that:
7. Which one of the following is not a fundamental control concept in evaluating the
organization of data processing?
A The authorization for all transactions should originate outside the information
technology department.
B There should be a fundamental segregation of duties between users and
information technology departments.
C The programming department should not have access the code under
development.
D Access to data should be provided only to users authorized by the data's owner.
A batch integrity.
B transmission confidentiality.
C data validation.
D communication repudiation.
A Counting the total number of records input and comparing them to the system.
B An identifier added to the field of the record that is unique to the transaction.
C Audit logging capabilities to determine which accounting personnel performed a
transaction.
D A mathematical algorithm used to verify the validity of data.
10. The control totals used to ensure the completeness of processing in a batch
processing environment include
A record count.
B control totals.
C hash totals.
6
D all of the above.
REVENUE ACCOUNTING SYSTEM
1. The maximum allowable account balance for a given customer is called the
a. Credit checkpoint
b. Credit limit
c. Reorder point
d. Backorder point
2. What is the normal procedure for new customers or customers making a purchase
that causes their credit limit to be exceeded?
a. Routine approval is granted without authorization
b. Specific approval must be granted by the credit manager
c. Reject the sale in either case without question
d. Check the credit bureau for a credit rating on the customer
3. Which batch totals are manually calculated for each batch in a typical sales order
entry system?
a. The record count and hash total of the quantities ordered
b. The financial total of the amounts billed to the customer and hash total of the
quantities ordered
c. The line count and record count
d. The record count and hash total of the sales order numbers
4. Most companies recognize sales when
a. Customer order is received
b. The merchandise is shipped
c. The merchandise is received by the customer
d. Cash is received on account
6. Which of the following transactions is not recorded in the cash receipts journal?
a. Expensing prepaid rent
b. Receipt of customer payments
c. Borrowing money from a bank
d. Sale of equipment for cash
7. For a retail store such as Wal-Mart, the relationship between sales and inventory
items is most likely to be represented as being which of the following
a. One-to-one
7
b. One-to-many
c. Many-to-one
d. Many-to-many
9. For good internal control over customer remittances, the mailroom clerk should
separate the checks from the remittance advices and send them to whom?
a. Billing
b. Accounts receivable
c. Cashier
d. Controller
8
DISBURSEMENT ACCOUNTING SYSTEM
4. When goods are being ordered from a vendor, which electronic files are either read
or updated?
a. Inventory, vendors, and accounts payable
b. Vendors and accounts payable
c. Open purchase orders and accounts payable
d. Inventory, vendors, and open purchase orders
5. What aspect below best characterizes a JIT inventory system?
a. Frequent deliveries of smaller quantities of items to the work centers.
b. Frequent deliveries of large quantities to be held at the work centers.
c. Less frequent deliveries of large quantities of goods to central receiving.
d. Infrequent bulk deliveries of items directly to work centers.
9
a. A document formally requesting a vendor to sell a certain product at a certain
price.
b. A request for delivery of certain items and quantities.
c. A contract between the buyer and vendor once accepted by the vendor.
d. All of the above are true.
9. The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the ________ function in the company.
a. Inventory control
b. Stores
c. Production
d. Purchasing
10. All of the following technologies could be useful aids in the receiving process except
?
a. Bar coding
b. Radio frequency identification tags
c. EFT
d. Satellite technology
10
AUDTING AROUND COMPUTER
1. When the client uses a computer but the auditor chooses to use only the
non-IT segment of internal control to assess control risk, it is referred to
as auditing around the computer. Which one of the following conditions
need not be present to audit around the computer?
a. Computer programs must be available in English.
b. The source documents must be available in a non-machine
language.
c. The documents must be filed in a manner that makes it possible to
locate them.
d. The output must be listed in sufficient detail to enable the auditor to
trace individual transactions.
4. Typical controls developed for manual systems which are still important
in IT systems include:
a. proper authorization of transactions.
b. competent and honest personnel.
c. careful and complete preparation of source documents.
d. all of the above.
12
a. Ability to process large volumes of transactions.
b. Ability to replace manual controls with computer-based controls.
c. Reduction in misstatements due to consistent processing of
transactions.
d. Over-reliance on computer-generated reports.
13
TEST DATA APPROACH
14
b. Insert New Data, And Choose sample subset from actual Database Data
c. Test Data and Actual Database
d. Database and New Data
7. To define test data approach has one of the _____ box techniques used by auditors
in a computer assisted auditing techniques.
a. Black
b. White
c. Gray
d. Blue
8. Which of the following best describes the test data approach?
a. Auditors process their own test data using their own computers that simulate the
client’s computer system.
b. Auditors process their own test data using the client’s computer system and
application program.
c. Auditors use client-controlled software to do the same operations that the
client’s software does, using auditor created data files.
d. Auditors use client-controlled software to do the same operations that the
client’s software does, using the same data files.
9. In auditing through a computer, the test data method is used by auditors to test
the?
a. Accuracy of input data
b. Validity of the output
c. Normalcy of distribution of test data
d. Procedures contained within the program
15
PARALLEL SIMULATION
1. Involves the auditor writing a computer program that replicates some part of a
client’s application system, processes actual client data through an auditor’s
generalized audit software program and compares the output obtained with output
obtained from the client.
a. Parallel simulation
b. Analytical audit techniques
c. Distributed simulation
d. Running massive parallel simulation
16
b. To provide evidences on the controls used in the client’s application programs.
c. Parallel simulation is the best technique for verification of calculations
d. All of the above
17
INTEGRATED TEST FACILITY (ITF)
2. To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of?
a. Accountant
b. Consultant
c. Controller
d. Auditor
18
c. It uses the same programs to compare processing using independently
calculated data. This involves setting up dummy entities on an application
system and processing test or production data against the entity as a means of
verifying processing accuracy.
d. Provides the IS auditor with a tool analyze a large range of information.
9. After a full operational contingency test, the IS auditor performs a review of the
recovery steps and concludes that the elapsed time until the technological
environment and systems were actually functioning exceeded the required critical
recovery time. Which of the following should be auditors recommend?
a. Broaden the processing capacity to gain recovery time.
b. Make improvements in the facility’s circulation structure.
c. Perform an Integral review of the recovery tasks.
d. Increase the amount of human resources involved in the recovery.
19
BATCH PROCESSING
20
6. Consider the following about Batch Processing:
I. It demands fewer organizational resources
II. Masterfile are not updated immediately
III. Processing takes place when the economic event occurs.
21
ON-LINE REAL TIME PROCESSING
1. Compared to batch processing, real-time has which of the following advantages?
a. Ease of implementation
b. Ease of auditing
c. Timelines of information
d. Efficiency of processing
2. Online real-time system typically requires three basic sub processes to be completed
before an event is converted into information that can be used by decision makers.
a. Business event occurs; record business event data
b. Update master data
c. Generate reports and support queries
d. All of the above
3. Consider the following statements:
Statement A: Real-time processing is ideal for processing large volume of data
transaction; it can be done or processed independently during less-busy time or at a
desired designated time.
Statement B: Real-time processing allows businesses or organizations to function
more effectively in terms of giving the organization the ability to take immediate action and
adjustments when responding to errors.
a. Statement A is false, Statement B is false
b. Statement A is false, Statement B is true
c. Statement A is true, Statement B is true
d. Statement A is true, Statement B is false
22
c. Output of data.
d. All of the above
6. On-line real time is
a. Time consuming
b. Expensive to buy
c. Both A and B
d. None of the above
9. All statements are true about Online Real-Time processing method except:
a. Used by Point of Sale (POS) Systems to update inventory, provide inventory
history, and sales of a particular item.
b. Is an efficient way of processing high volumes of data is where a group of
transactions is collected over a period of time.
c. Systems gather business event data at the time of occurrence, update the master
data almost instantaneously, and provide the results arising from the business event within
a very short time
d. Assembly lines use real time processing to reduce time, cost and errors.
23
BUS TOPOLOGY
4. Statement 1: it is difficult to identify the problems if the whole network goes down.
Statement 2: it can be hard to troubleshoot individual device issues.
Which of the following statement is care true?
a. Both 1 and 2.
b. 2 only
24
c. 1only
d. None of the above
25
d. II only
STAR TOPOLOGY
1. In this topology, all the components of network are connected to the central device
called “hub”.
a. Bus topology
b. Ring topology
c. Star topology
d. Tree topology
2. A topology which can be said that every computer is indirectly connected to every
other node by the help of the “hub”.
a. Bus topology
b. Ring topology
c. Star topology
d. Tree topology
26
4. Unshielded Twisted Pair (UTP) Ethernet cable is suited well in:
a. Mesh topology
b. Tree topology
c. Star topology
d. Ring topology
27
RING TOPOLOGY
5. in a network with 25 computer, which one of the following topologies would require
the least cabling
a. mesh topology
b. star topology
c. bus topology
d. ring topology
8. FDDI is a _________.
a. ring network
b. star network
c. mesh network
d. bus based network
29
TREE TOPOLOGY
30
4. A topology that is supported by several hardware and software vendors?
a. Bus Topology
b. Ring topology
c. Mesh topology
d. Tree topology
5. A topology that the computers have access to a larger and their immediate
networks
a. Bus topology
b. Ring topology
c. Tree topology
d. Mesh topology
31
MESH TOPOLOGY
4. They are expected to play an important part in the Internet of Things (IoT).
a. Tree Topology
b. Star Topology
c. Bus Topology
d. Mesh Topology
32
5. Mesh topology is divided into two. What are they?
a. Full Mesh Topology
b. Partial Mesh Topology
c. Quarter Mesh Topology
d. Triple Mesh Topology
6. This type of mesh topology requires each node to be interconnected with each
other.
a. Full Mesh Topology
b. Partial Mesh Topology
c. Quarter Mesh Topology
d. Triple Mesh Topology
9. ________ is one of the most used network connection in the world that uses mesh
topology.
a. LAN
b. Office
c. Company
d. Internet
33
PART II. Suggested answers and explanation
1. C. Access control
Access control would only cover access approval, authentication and access control
are often combined into a single operation, authentication methods and tokens
include passwords, personal identification numbers and etc.
2. A. System analyst
System analyst set up new computer systems, both the hardware and software add
new software applications to increase computer productivity.
3. B. Password
Access controls is a way of limiting access to a system or to physical or virtual
resources to ensure that users have proper authorization to perform a task.
4. D. A and B
Hardware controls or Equipment controls are computer controls built into physical
equipment by the manufacturer to detect and control errors arising from the use of
equipment.
5. D. A and D
Data and other procedural controls also known as “back-up files” assures the continuity
of the operation in the event of any physical disaster.
6. C. Check digit
Single digit placed consistently in any position. Number added to a code to derive a
further number as a means of verifying the accuracy or validity of the code as it is
printed or transmitted.
7. D. Output control
The output controls describes the immediate results of the process. Compare output
results with expected results by checking the output against the input.
8. A. Hash total
The sum of unrelated numbers. The hash total does not provide useful data, but is
used as a check to ensure inputs were entered correctly.
9. B. Hardware controls
Financial total is normally used in batch processing method. Financial data consists of
pieces or sets of information related to the financial health of the business.
10. D. Check digit
34
Number added to a code to derive a further number as a means of verifying the
accuracy or validity of the code as it is printed or transmitted. Single digit placed
consistently in any position.
35
DISBURSEMENT ACCOUNTING SYSTEM
1. Answer C.
Reverse auction is a type of auction in which the roles of buyer and seller are reversed.
It is one technique that may reduce purchasing.
2. Answer D
Disbursement voucher is a form used to have a check made to pay an individual or an
organization for merchandise sold or service rendered. There are no disadvantages
to using disbursement voucher.
3. Answer D.
The final activity in the expenditure cycle is the payment of approved invoices.
4. Answer D
Inventory vendors and open purchase orders are electronic files that you can read
when goods are being ordered from a vendor.
5. Answer A.
JIT is frequent deliveries of smaller quantities of items to the work centers.
6. Answer C.
Credit rating of vendor would not be a major certain in vendor selection.
7. Answer D.
Purchase order is a document formally requesting a vendor to sell a certain product at
a certain price. A request for delivery of certain items and quantities.A contract
between the buyer and vendor once accepted by the vendor.
8. Answer C
Copies of the purchase order are typically sent to the vendor and to the receiving and
accounts payable departments.
9. Answer C.
The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the production.
10. Answer C.
EFT is a form of counseling intervention that draws on various theories of alternative
medicine
it is not useful aid in the receiving process.
36
AUDITING AROUND
1.A.
Computer programs must be available in English.
2. C
. processing controls.
3.B
. understanding of the system.
4.D
. all of the above.
5 D.
It may take the recordkeeping function and the document preparation function
away from those who have custody of assets and put those functions into the IT
center
6. D.
general controls
7. C
. Observation of transaction processing
8. C
. auditing around the computer.
9. C
. Processing controls.
10. B
. review of data for reasonableness by someone who knows what the output should
look like.
37
AUDITING THROUGH
1. A. Pilot simulation.
2. B. observation.
3. D. Over-reliance on computer-generated reports.
4. D. Programming is not allowed online and must be done separately.
5. B. Increased human involvement.
6. D. Manual controls replace automated controls.
7. C. Improved audit trail
8. C. Hardware controls.
9. C. Physical and online security.
D. Application controls relate to the processing of individual transactions
38
TEST DATA APPROACH- Answers
1. C- Prepare transaction and results is the first step in test data approach.
2. B-Test transaction should be Logical process
3. D- Requires limited technical knowledge is not a disadvantage of test data
approach
4. D - Cost for constructing test data, pre determine the result manually and
ascertaining which controls to be tested.
5. B – are the four qualities of test data that must possess Realistic, Practically Valid,
Versatile and Cover Scenarios’ and Exceptional Data.
6. B- is the only way to prepare Test Data
7. C - Test data involves auditor preparation of a series of Fictitious transactions
8. B- To define test data approach has one of the White box techniques used by auditors
in a computer assisted auditing techniques
9. B- Auditors process their own test data using the client’s computer system and
application program is the best describes the test data approach
10. D - In auditing through a computer, the test data method is used by auditors to test
the Procedures contained within the program
39
PARALLEL SIMULATION- Answers
1. A- Parallel simulation Involves the auditor writing a computer program that replicates
some part of a client’s application system, processes actual client data through an
auditor’s generalized audit software program and compares the output obtained with
output obtained from the client
4. C- Auditor runs the simulated program using selected data and files
5. C - The auditor can verify the transactions and Enables the valuation of effects of
nonexistent control procedures are the advantages of parallel simulation.
10. B - Independent, internal and external (Government) are the Primary types of auditors.
40
INTEGRATED TEST FACILITY (ITF)- Answers
1. B -To audit an AIS in an operational setting is the purpose integrated test facility.
2. D- To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of Auditor.
3. D- Supports continuous monitoring of controls, testing can be unscheduled and
unknown to other staff and It provides prima facie evidence of correct program functions
are the advantages in Integrated Test Facility (ITF).
4. A - The potential of corrupting data files with test data that may end up in the Financial
Reporting Process is the disadvantages of Integrated Test Facility (ITF).
5. C -It uses the same programs to compare processing using independently calculated
data. This involves setting up dummy entities on an application system and processing
test or production data against the entity as a means of verifying processing accuracy.
6. C- The first step in auditing a network is to understand the network architecture and
design. This would provide an overall picture of the network of the enterprises and its
connectivity. This will be starting point for identifying the various layers of information and
the access architecture across the various layers, such as proxy servers, firewalls and
client/server application. Reviewing validity of password changes would be performed as
part of substantive testing.
7. B- "Enabling audit trails helps in establishing the accountability and responsibility of
processed transactions by tracing transactions through the system. The objective enabling
software to provide audit trails is not to improve system efficiency, since it often involves
additional processing which may in fact reduce response time for users.
Enabling audit trails does involve storage and thus occupies
disk space. Choice C is also a valid reason however, it is not the primary reason"
8. C.-The least significant would be the description of computer hardware. The
organization would need to have compatible and sufficient hardware to be considered a
viable service provider before contract provisions are reviewed.
9. C.-Performing an exhaustive review of the recovery tasks would be appropriate to
identify the way these tasks were performed, the time allocated to each of the steps
required to accomplish recovery, and determine where adjustments can
be made. Choices A, B, and D could be actions after the
described review has been completed.
41
10. A-An ITF creates fictitious entity in the database to process test transaction
simultaneously with live input. Its advantage is that periodic testing does not require
separate test process. However, careful planning is necessary, and test data must be
isolated from production data.
42
ONLINE REALTIME
1. Answer A.
- A turnaround document is a source document generated by the computer system as
output and then later used as input for subsequent processing. Turnaround
documents are least likely to be found in an online, real-time processing system
because it normally does not use source documents.
2. Answer D.
- Computers are designed to include hardware diagnostic routines that allow
identification of hardware problems such as parity check to determine if the integrity
of the bit structure of each character has been destroyed during the internal
transmission of data within the system.
3. Answer A.
- Real time system processes the entire transactions as it occurs with less interaction.
4. Answer C.
- One of the examples of real time processing is the ATM which is expensive to buy.
5. Answer D.
- In online real time processing, as transaction occurs, it is subject for validation with no
time delay.
6. Answer A.
- Online real time processing is expensive to buy. One of the examples is Bank ATM,
radar systems and customer services. Etc.
7. Answer B.
- Is correct because on-line real-time systems are those for which processing is
performed as data are input and the results are available immediately
8. Answer A.
- All of the statements are true with regards to Online real time processing.
9. Answer C.
- Airline reservations system is an example of Online Real time Processing, which
processes requests for services from one traveler at a time while he or she waits.
10. Answer D.
- All of the following are characteristic of Online Real time Processing.
43
BUS TOPOLOGY
SUGGESTED ANSWERS AND EXPLANATION
1. Answer: B
Bus Topology is set up in a linear fashion which is connected to a single network.
2. Answer: D
Since it was connected to a single cable, the network will fail or split in to two if the
main cable is damage
3. Answer: A
Terminators is required for both the ends of the main cable
4. Answer: A
Both 1 and 2 contain disadvantage of using Bus Topology.
5. Answer :C
Called as line topology because of its linear fashion
6. Answer: C
All of the above is said to be disadvantage of BUS Topology.
7. Answer: A
Since it is work well in a small network, it will only require less cable length.
8. Answer: A
Bus is the main single cable is that connects the computer and network in a linear
fashion.
9. Answer: D
All of the following are advantage and disadvantages of using Star Topology.
10. Answer: D
It works well in a small network.
44
STAR TOPOLOGY
SUGGESTED ANSWERS AND EXPLANATION
1. Answer C.
In star topology, all the components of the network are connected to a device called
“hub” which may be a hub, router or a switch.
2. Answer C.
Star topology workstations are connected to central device with a point to point
connection.
3. Answer A.
Statement B is false because Hub is present in star topology
4. Answer C.
UTP is used to connect workstations to central node which is present in a star
topology
5. Answer C.
Star topology workstations are connected to a hub which is the central device with a
point connection.
6. Answer C.
Both statements refer to a star topology
7. Answer A.
In star topology, new nodes can be easily added without affecting the rest of the
network.
8. Answer A.
Hub with UTP Ethernet cable is applicable to a star topology with a central node.
9. Answer D.
Star topology has a central device called the hub. One of its disadvantage is that
star topology depends on a central device which can fail the whole network
10. Answer A.
Answer b, c and d is applicable to bus, mesh and tree topology respectively
45
RING TOPOLOGY
SUGGESTED ANSWERS AND EXPLANATION
1. Answer A
the ring topology is the most reliable topologies.
2. Answer A
ring topology is a network topology in which each node connects to exactly two
other nodes, performing a single continuous pathway for signals through each
nodes.
3. Answer C
IEEE 802.5, the token passing scheme is used in place of carrier sense multiple
access with collision detection (CSMA/CD) on a ring topology, local area network
(LAN). a token is circulated around network.
4. Answer A
the "each computer has equal access to resources" is one of the advantages of
ring topology.
5. Answer D
ring topology is a network topology in which each node connects to exactly two
other nodes, performing a single continuous pathway for signals through each
nodes. it is only require a least cabling.
6. Answer B
the operating speed of token ring is 16Mbps.
7. Answer B
There is no need for network server to control the connectivity between
workstations. Additional components do not affect the performance of network.
Each computer has equal access to resources. they are all advantages of ring
topology.
8. Answer A
FDDI logical topology is a ring-based token network.
9. Answer B
the CSMA/CD is used in ring topology. the token passing scheme is used in place
of carrier sense multiple access with collision detection (CSMA/CD) on a ring
topology, local area network (LAN).
46
10. Answer A
IEEE 802.5, the token passing scheme is used in place of carrier sense multiple
access with collision detection (CSMA/CD) on a ring topology.
TREE TOPOLOGY
SUGGESTED ANSWERS AND EXPLANATION
1. Answer B.
Definition of tree topology
2. Answer D.
Both a and b are the advantages of a tree topology while c is a disadvantages
3. Answer D.
I,II and III are all disadvantages of tree topology
4. Answer D.
tree topology
5. Answer C.
tree topology
6. Answer B.
Tree topology is a mixture of the characteristics of bus and star topology.
7. Answer D.
Tree topology is also called expanded star topology because cables are like a main
stem of a tree and other star networks as the branches.
8. Answer A.
Ethernet protocol is best suited in a star topology
9. Answer A.
Statement B refers to a bus topology
10. Answer A.
Letters b, c and d are disadvantages of a tree topology.
47
MESH TOPOLOGY
SUGGESTED ANSWERS AND EXPLANATION
1. C. Each node needs to both send messages as well as act as a router, which
causes the complexity of each node to go up pretty significantly.
3. A. if one of the nodes goes down, it doesn’t necessarily bring the entire network
down.
4. D. network nodes can "talk" directly to each other without requiring the assistance
of an Internet connection.
5. A & B. Full Mesh where all is interconnected & Partial Mesh where nodes are
allowed to other nodes.
48