Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Technological Institute of the Philippines BSA AIS 002L1 ASSESSMENT 5

Technological Institute of the Philippines BSA AIS 002L1 ASSESSMENT 5

Business

Technological Institute of the Philippines

BSA AIS 002L1

ASSESSMENT 5.1 IN AIS

1)The potential risks to the Financial Reporting System include the following EXCEPT:

a.            A defective audit trail and unauthorized access to the general ledger.

b.            GL accounts that are out of balance with subsidiary accounts.

c.             Incorrect GL account balances because of unauthorized or incorrect journal vouchers. d. GL accounts that are reconciled with a validated subsidiary accounts

 

2.            This is an element of REA of which the things are of economic value to the organization. They are defined as objects that are both scarce and under the control of the enterprise. These are used in economic exchanges with trading partners and are either increased or decreased by the exchange.

a.            Events

b.            Resources

c.             Agent

d.            Sales

 

3.            Selection of database tables in the thousands setting the switches in the system. a. Database configuration

b.            Data Warehouse

c.             Data Extraction

d.            None of the above

 

4.            E-Commerce is

a.            The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); and electronic trading of stocks.

 

b.            The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); and direct consumer marketing.

c.             The electronic processing and transmission of business data and electronic buying and selling of goods and services on-line delivery of digital products; electronic funds transfer (EFT); electronic trading of stocks and direct consumer marketing.

d.            The electronic processing and transmission of business data; electronic funds transfer (EFT); electronic trading of stocks and direct consumer marketing

 

5.            Remote users send requests via terminals for data to the central site, which processes the requests and transmits the data

back to the user. The central site performs the functions of a file manager that services the data needs of the remote users.

a.            Centralized databases

b.            Replicated Databases

c.             Distributed Databases

d.            Not of the above

 

6.            Database Lockout - which is a software control (usually a function of the DBMS) that

a.            prevents various accesses to data.

b.            prevents multiple simultaneous accesses to data.

c.             prevents unauthorized accesses to data.

d.            None of the above

 

 

 

 

 

 

7.            Cleansing extracted data

a.            Involves filtering out or repairing valid data prior to being stored in the warehouse. b. involves transforming data into standard business terms with standard data values.

c.The process of collecting data from operational databases, flat-files, archives, and external data sources.

d. A key feature of a data warehouse is that the data contained in it are in a non-volatile state.

 

8.            Under the Sarbanes-Oxley legislation, it is required that the management design and implement controls over

a.            The financial reporting process.

b.            The controlling process

c.             The transaction process

d.            Any of the above

 

9.            A password controlled network for private users a. Extranets

b.            Packet switching

c.             Virtual private network (VPN)

d.            World Wide Web

 

 

10.          Data sharing is the central concept of the database approach.

a.            The presence of ownership

b.            The entitlement of owners c. The absence of ownership

d. None of the above

 

11.          This approach places all the firm’s information eggs in one basket. It is essential, therefore, to take very

good care of the basket.

a.            Data approach

b.            Database approach

c.             Information approach

d.            None of the above

 

12.          They will not be responsible for normalizing an organization’s databases, they should have an understanding of the process and be able to determine whether a table is properly normalized.

a.            IT programmers

b.            Data Administrator

c.             Management d. Accountant

 

 

13.          This is often called as discretionary reporting (optional). It is not mandated as in financial reporting. This is mandated by SOX legislation – all public companies should prepare and monitor on effectiveness of internal controls over financing reporting.

a.            Management Reporting System

b.            Database Management System

c.             Financial Reporting System

d.            Any of the above

 

14.          The management functions of planning and control have a profound effect on the Management Reporting System. The

 

                is concerned with making decisions about the future activities of the organization.

a.            planning function

b.            assessment functions

c.             control functions

d.            reporting functions

 

15.          This usually encompasses a period of between 1 and 5years.while short-term planning involves the implementation of specific

plans that are needed to achieve the objectives of the long-range plan.

a. Short-term planning b. Long-range planning

c. Medium-term planning

d.. No specific term planning

 

16.          The General Ledger System Database includes the following files:

a.            general ledger master file and general ledger history file

b.            journal voucher file and journal voucher history file

c.             responsibility center file and budget master file d. All of the above

 

17.          This principle suggests that managers should limit their attention to potential problem areas rather than being involved with

every activity or decision. Managers need information that identifies operations or resources at risk of going out of control.

a. Management by objectives b. Management by exception

c. Operation Management

d. Strategic Management

 

18.          This provides a controlled environment to assist (or prevent) user access to the database and to efficiently manage the data resource. This model accomplishes these objectives differently, but some typical features include:

a.            Database Management System

 

b.            Legacy system

c.             Online System

d.            Real time system

 

19.          Online Analytical Processing supports management-critical tasks through analytical investigation of complex data associations captured in data warehouses except:

a.            Consolidation is the aggregation or roll-up of data.

b.            Selection of database tables in the thousands setting the switches in the system

c.             Drill-down allows the user to see data in selectively increasing levels of detail.

d.            Slicing and Dicing enables the user to examine data from different viewpoints to uncover trends and patterns.

 

20.          Human involvements is not necessary to approve transactions.

a.            In one EDI systems

b.            In mixed EDI systems c. In pure EDI systems,

d. In unauthenticated EDI systems

 

21.          The Systems Development Life Cycle is described as follows except

a.            A logical sequence of activities used to identify new systems needs

b.            A logical sequence of activities used to develop new systems to support those needs c. A model for increasing risk through planning, execution, control, and documentation.

d. A model for reducing risk through planning, execution, control, and documentation

 

22.          The following are implications to internal control except

a.            Independent verification is an implication to internal control where traditional verifications are meaningful.

b.            Access to data warehouse is a control issue where data warehouses often involve sharing information with suppliers and customers.

 

c.             Access controls is an implication to internal control with critical concern with confidentiality of information.

d.            Contingency planning is an implication to internal control by keeping a business going in case of disaster.

 

23.          Advantages of EDI are as follows except

a.            Reduction or elimination of data entry; reduction of errors

b.            Reduction of paper; reduction of paper processing and postage

c.             Reduction of inventories (via JIT systems)

d.            Reduction in retail prices through higher marketing costs

 

24.          Many companies have found the balanced scorecard (BSC) a useful tool to translate strategy into action.

The BSC recommends viewing an organization using the four perspectives as follows except:

a.            learning and growth

b.            external business and internal business process

c.             customer

d.            financial

 

 

 

 

25.          This is a federation of computers located close together (on the same floor or in the same building) linked together to share data and hardware

a.            WAN

b.            VPN c. LAN

d. VAN

 

26.          This may use common carrier facilities, such as telephone lines.

a. Local Area Network b. Wide Area Network

c. Value Added Network

d. Electronic Data Interchange

 

27.          Companies may have internal EDI translation/communication software and hardware. Examples of business transaction documents that can be spent automatically with EDI Except

a. purchase orders b. deposit statuses

c. invoices customs information, payment confirmations

d. inventory documents.

 

 

 

 

28.          This pose a threat to both Internet and Intranet users. Managed effectively  inherent risks to business/E-commerce in order not to adversely affect the business operation.

a.            Firewall

b.            Password

c.             PIN

d.            Trojan horses

Option 1

Low Cost Option
Download this past answer in few clicks

2.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions