27.07.2015 Views

ACC 340 Final Exam Guide-acc340dotcom

For more course tutorials visit www.acc340.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often recurring and are difficult to estimate c) Many benefits are intangible and are not easily known or measured d) Justifying a new technology is no different from any other capital budgeting problem

For more course tutorials visit
www.acc340.com

Multiple-Choice Questions

1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called:
a) Financial shadowing
b) Managerial trace technique
c) Concatenation
d) Audit trail

2. Justifying expenditures for new technologies is especially difficult because:
a) You do not know how many jobs will be affected
b) Expenses are often recurring and are difficult to estimate
c) Many benefits are intangible and are not easily known or measured
d) Justifying a new technology is no different from any other capital budgeting problem

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>ACC</strong> <strong>340</strong> <strong>Final</strong> <strong>Exam</strong> <strong>Guide</strong><br />

Click Here to Buy the Tutorial<br />

http://www.acc<strong>340</strong>.com/product-22-<strong>ACC</strong>-<strong>340</strong>-<strong>Final</strong>-<br />

<strong>Exam</strong>-<strong>Guide</strong><br />

For more course tutorials visit<br />

www.acc<strong>340</strong>.com<br />

Multiple-Choice Questions<br />

1. The process by which a financial transaction is recorded so that its<br />

flow through the system can be followed is called:<br />

a) Financial shadowing<br />

b) Managerial trace technique<br />

c) Concatenation<br />

d) Audit trail<br />

2. Justifying expenditures for new technologies is especially difficult<br />

because:<br />

a) You do not know how many jobs will be affected<br />

b) Expenses are often recurring and are difficult to estimate<br />

c) Many benefits are intangible and are not easily known or measured


d) Justifying a new technology is no different from any other capital<br />

budgeting problem<br />

3. The essential steps in performing a systems study are (in order of<br />

occurrence):<br />

a) Analysis, design, implementation and initial operation, follow up<br />

b) Design, planning, follow up, analysis, and implementation<br />

c) Planning, system specification, analysis, production,<br />

implementation<br />

d) Planning, analysis, design, implementation, and follow up<br />

4. What is the first step to be performed by most organizations in their<br />

accounting cycles?<br />

a) Recording business transactions in a journal<br />

b) Preparing a trial balance<br />

c) Recording closing entries in a journal<br />

d) Preparing transaction source documents<br />

e) none of the above<br />

5. Which systems study step is normally performed first?<br />

a) Design<br />

b) Initial operation<br />

c) Follow up<br />

d) Analysis


e) none of the above<br />

6. The purpose of a company firewall is to:<br />

a) Guard against spoofing<br />

b) Assist the IETF<br />

c) Deny computer hackers access to sensitive data<br />

d) all of the above<br />

7. The term data encryption refers to:<br />

a) Storing data in safe places called “crypts”<br />

b) Transforming data into secret codes<br />

c) Scrambling data in random ways that cannot be unscrambled<br />

d) none of these<br />

8. An advantage of an extranet is that:<br />

a) It can disseminate information corporate wide<br />

b) It can be accessed by selected trading partners<br />

c) Users can employ common web browsers to access information in<br />

them<br />

d) all of the above<br />

9. Another name for an Internet domain address is its:<br />

a) URL


) ISP<br />

c) email address<br />

d) IETF<br />

10. Business process reengineering efforts sometimes fail<br />

because:<br />

a) Management gets too involved in the process<br />

b) Management is too optimistic regarding its expectations<br />

from its implementation<br />

c) Management support can never overcome employee<br />

resistance<br />

d) Employees will never accept change<br />

11. The sales process begins with:<br />

a) Placing an order with a vendor<br />

b) A customer order for goods or services<br />

c) Production of goods or services<br />

d) Delivery of goods or services<br />

12. The primary objective in processing revenues is to:<br />

a) Sell as many goods as possible<br />

b) Achieve timely and efficient cash collection<br />

c) Maximize an organization’s sales orders


d) Only sell goods to customers who can pay their bills<br />

13. An important input to the sales process is:<br />

a) A customer sales order<br />

b) The cash forecast<br />

c) Aged accounts receivable information<br />

d) A receiving report<br />

14. Which of the following is not an example of a source document?<br />

a) Receiving report<br />

b) Purchase order<br />

c) Sales order<br />

d) Aging report<br />

15. Inputs to transaction processing systems:<br />

a) Are always in hard copy<br />

b) Are best when input in a graphical format<br />

c) May be in an electronic format when an EDI system is used<br />

d) May never be audio<br />

16.Integrated accounting software programs generally include all of<br />

the following, except:<br />

a) Graphic reporting capabilities


) Internet connectivity<br />

c) One standardized chart of accounts<br />

d) The ability to handle multiple companies<br />

17. Enterprise-wide AISs:<br />

a) Almost never pay for themselves<br />

b) Do not include many more features than middle-range accounting<br />

software packages<br />

c) Are seldom used by multinational organizations<br />

d) Integrate an organization’s financial functions with its other<br />

functional areas<br />

18. Training and change management activities:<br />

a) Take place just before the go live stage of implementation<br />

b) Are most effective when conducted throughout design, go live, and<br />

post-implementation follow-up<br />

c) Include technical training only<br />

d) Do not include the design of user interfaces<br />

19. Which of the following software packages is not an example of a<br />

middle-range AIS?<br />

a) Great Plains Dynamics<br />

b) MAS 90<br />

c) SAP R/3


d) Solomon<br />

20. Many organizations purchased new AISs during the 1990’s:<br />

a) Because of the need for Year 2000 compliance<br />

b) Because they wanted Internet connectivity<br />

c) In order to take advantage of opportunities for reengineering<br />

d) all of the above

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!