Fill This Form To Receive Instant Help
Homework answers / question archive / Technological Institute of the Philippines BSA AIS 002L1 ASSESSMENT 5
Technological Institute of the Philippines
BSA AIS 002L1
ASSESSMENT 5.1 IN AIS
1)The potential risks to the Financial Reporting System include the following EXCEPT:
a. A defective audit trail and unauthorized access to the general ledger.
b. GL accounts that are out of balance with subsidiary accounts.
c. Incorrect GL account balances because of unauthorized or incorrect journal vouchers. d. GL accounts that are reconciled with a validated subsidiary accounts
2. This is an element of REA of which the things are of economic value to the organization. They are defined as objects that are both scarce and under the control of the enterprise. These are used in economic exchanges with trading partners and are either increased or decreased by the exchange.
a. Events
b. Resources
c. Agent
d. Sales
3. Selection of database tables in the thousands setting the switches in the system. a. Database configuration
b. Data Warehouse
c. Data Extraction
d. None of the above
4. E-Commerce is
a. The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); and electronic trading of stocks.
b. The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); and direct consumer marketing.
c. The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); electronic trading of stocks and direct consumer marketing.
d. The electronic processing and transmission of business data; electronic funds transfer (EFT); electronic trading of stocks and direct consumer marketing
5. Remote users send requests via terminals for data to the central site, which processes the requests and transmits the data
back to the user. The central site performs the functions of a file manager that services the data needs of the remote users.
a. Centralized databases
b. Replicated Databases
c. Distributed Databases
d. Not of the above
6. Database Lockout - which is a software control (usually a function of the DBMS) that
a. prevents various accesses to data.
b. prevents multiple simultaneous accesses to data.
c. prevents unauthorized accesses to data.
d. None of the above
7. Cleansing extracted data
a. Involves filtering out or repairing valid data prior to being stored in the warehouse. b. involves transforming data into standard business terms with standard data values.
c.The process of collecting data from operational databases, flat-files, archives, and external data sources.
d. A key feature of a data warehouse is that the data contained in it are in a non-volatile state.
8. Under the Sarbanes-Oxley legislation, it is required that the management design and implement controls over
a. The financial reporting process.
b. The controlling process
c. The transaction process
d. Any of the above
9. A password controlled network for private users a. Extranets
b. Packet switching
c. Virtual private network (VPN)
d. World Wide Web
10. Data sharing is the central concept of the database approach.
a. The presence of ownership
b. The entitlement of owners c. The absence of ownership
d. None of the above
11. This approach places all the firm’s information eggs in one basket. It is essential, therefore, to take very
good care of the basket.
a. Data approach
b. Database approach
c. Information approach
d. None of the above
12. They will not be responsible for normalizing an organization’s databases, they should have an understanding of the process and be able to determine whether a table is properly normalized.
a. IT programmers
b. Data Administrator
c. Management d. Accountant
13. This is often called as discretionary reporting (optional). It is not mandated as in financial reporting. This is mandated by SOX legislation – all public companies should prepare and monitor on effectiveness of internal controls over financing reporting.
a. Management Reporting System
b. Database Management System
c. Financial Reporting System
d. Any of the above
14. The management functions of planning and control have a profound effect on the Management Reporting System. The
is concerned with making decisions about the future activities of the organization.
a. planning function
b. assessment functions
c. control functions
d. reporting functions
15. This usually encompasses a period of between 1 and 5years.while short-term planning involves the implementation of specific
plans that are needed to achieve the objectives of the long-range plan.
a. Short-term planning b. Long-range planning
c. Medium-term planning
d.. No specific term planning
16. The General Ledger System Database includes the following files:
a. general ledger master file and general ledger history file
b. journal voucher file and journal voucher history file
c. responsibility center file and budget master file d. All of the above
17. This principle suggests that managers should limit their attention to potential problem areas rather than being involved with
every activity or decision. Managers need information that identifies operations or resources at risk of going out of control.
a. Management by objectives b. Management by exception
c. Operation Management
d. Strategic Management
18. This provides a controlled environment to assist (or prevent) user access to the database and to efficiently manage the data resource. This model accomplishes these objectives differently, but some typical features include:
a. Database Management System
b. Legacy system
c. Online System
d. Real time system
19. Online Analytical Processing supports management-critical tasks through analytical investigation of complex data associations captured in data warehouses except:
a. Consolidation is the aggregation or roll-up of data.
b. Selection of database tables in the thousands setting the switches in the system
c. Drill-down allows the user to see data in selectively increasing levels of detail.
d. Slicing and Dicing enables the user to examine data from different viewpoints to uncover trends and patterns.
20. Human involvements is not necessary to approve transactions.
a. In one EDI systems
b. In mixed EDI systems c. In pure EDI systems,
d. In unauthenticated EDI systems
21. The Systems Development Life Cycle is described as follows except
a. A logical sequence of activities used to identify new systems needs
b. A logical sequence of activities used to develop new systems to support those needs c. A model for increasing risk through planning, execution, control, and documentation.
d. A model for reducing risk through planning, execution, control, and documentation
22. The following are implications to internal control except
a. Independent verification is an implication to internal control where traditional verifications are meaningful.
b. Access to data warehouse is a control issue where data warehouses often involve sharing information with suppliers and customers.
c. Access controls is an implication to internal control with critical concern with confidentiality of information.
d. Contingency planning is an implication to internal control by keeping a business going in case of disaster.
23. Advantages of EDI are as follows except
a. Reduction or elimination of data entry; reduction of errors
b. Reduction of paper; reduction of paper processing and postage
c. Reduction of inventories (via JIT systems)
d. Reduction in retail prices through higher marketing costs
24. Many companies have found the balanced scorecard (BSC) a useful tool to translate strategy into action.
The BSC recommends viewing an organization using the four perspectives as follows except:
a. learning and growth
b. external business and internal business process
c. customer
d. financial
25. This is a federation of computers located close together (on the same floor or in the same building) linked together to share data and hardware
a. WAN
b. VPN c. LAN
d. VAN
26. This may use common carrier facilities, such as telephone lines.
a. Local Area Network b. Wide Area Network
c. Value Added Network
d. Electronic Data Interchange
27. Companies may have internal EDI translation/communication software and hardware. Examples of business transaction documents that can be spent automatically with EDI Except
a. purchase orders b. deposit statuses
c. invoices customs information, payment confirmations
d. inventory documents.
28. This pose a threat to both Internet and Intranet users. Managed effectively inherent risks to business/E-commerce in order not to adversely affect the business operation.
a. Firewall
b. Password
c. PIN
d. Trojan horses