Exam Two
MAC570
Accounting Information Systems
Fontbonne
University
Summer
2013
Student Name:
How You Will Be Graded:
10 True-False (0.5 points
each): 5 pts
30 Multiple Choice (1
points each): 30 pts
9 Short Answer (5 points
each) 45 pts
8 Take-Home Essays (15
points each): 120 pts
Total: 200 pts
True / False Questions (1
point each)
1.
The database approach to data
management is sometimes called the flat file approach.
2.
A lockout is a software control that prevents
multiple users from simultaneous access to data.
3.
According to the REA
philosophy, information systems should support only the needs of accounting
professionals.
4.
Modern managers need both
financial and nonfinancial information that traditional GAAP-based accounting
systems are incapable of providing.
5.
The primary goal of installing an ERP system
is achieving business process reengineering to improve customer service, reduce
production time, increase productivity, and improve decision-making.
6.
Organizations using ERP systems employ an
internal control tool called a role.
7.
The network paradox is that networks exist to
provide user access to shared resources while one of its most important
objectives is to control access.
8.
The rules that make it possible for users of
networks to communicate are called protocols.
9.
All of the steps in the Systems
Development Life Cycle apply to software that is developed in-house and to
commercial software.
10. A qualified opinion on management’s assessment of internal controls
over the financial reporting system necessitates a qualified opinion on the
financial statements?
Multiple Choice Questions
(2 points each)
1. Which
of the following is not a problem usually associated with the flat-file
approach to data management?
|
a. |
data |
|
b. |
restricting |
|
c. |
data storage |
|
d. |
currency of |
2. The
deletion anomaly in unnormalized databases
|
a. |
is easily |
|
b. |
may result in |
|
c. |
complicates |
|
d. |
requires the |
3. Data
currency is preserved in a centralized database by
|
a. |
partitioning |
|
b. |
using a |
|
c. |
replicating |
|
d. |
implementing |
4. Which
procedure will prevent two end users from accessing the same data element at
the same time?
|
a. |
data |
|
b. |
data |
|
c. |
data lockout |
|
d. |
none of the |
5. A
replicated database is appropriate when
|
a. |
there is |
|
b. |
there exists |
|
c. |
there is no |
|
d. |
most data |
6. Which
statement is NOT true? REA resources
are:
|
a. |
assets |
|
b. |
affected by |
|
c. |
scarce |
|
d. |
under the |
7. The ‘R’
in REA stands for
|
a. |
ratios |
|
b. |
relationships |
|
c. |
resources |
|
d. |
reserves |
8. The ‘E’
in REA stands for
|
a. |
events |
|
b. |
estimates |
|
c. |
economics |
|
d. |
entities |
9. The ‘A’
in REA stands for
|
a. |
assets |
|
b. |
apportionment |
|
c. |
allocation |
|
d. |
agents |
10. In an
REA model, events are described from the perspective of
|
a. |
the |
|
b. |
the designer |
|
c. |
the user |
|
d. |
the customer |
11.
Goals of ERP include all of the
following except
|
a. |
improved |
|
b. |
improvements |
|
c. |
reduced |
|
d. |
increased |
12. Which of the following statements is not
true?
|
a. |
In a typical |
|
b. |
Client |
|
c. |
In |
|
d. |
The database |
13. Auditors of ERP systems
|
a. |
need not |
|
b. |
may feel |
|
c. |
find |
|
d. |
need not |
14. Legacy systems are
|
a. |
old manual |
|
b. |
flat file |
|
c. |
stable |
|
d. |
advanced |
15. The setup of a data warehouse includes
|
a. |
modeling the |
|
b. |
extracting |
|
c. |
cleansing |
|
d. |
all of the |
16. What do you call a system of computers that
connects the internal users of an organization that is distributed over a wide
geographic area?
|
a. |
LAN |
|
b. |
decentralized |
|
c. |
multidrop |
|
d. |
Intranet |
17.
Network protocols fulfill all of the
following objectives except
|
a. |
facilitate |
|
b. |
provide a |
|
c. |
promote |
|
d. |
result in |
18. The primary difference between a LAN and a
WAN is
|
a. |
the |
|
b. |
the |
|
c. |
the type of |
|
d. |
the size of |
19. FTP
|
a. |
is the |
|
b. |
controls Web |
|
c. |
is used to |
|
d. |
is used to |
|
e. |
is a |
20. An IP Address:
|
a. |
defines the |
|
b. |
is the |
|
c. |
is |
|
d. |
is the |
|
e. |
none of the |
21. Examples of one-time costs include all of the
following except
|
a. |
hardware |
|
b. |
insurance |
|
c. |
site |
|
d. |
programming |
22. Examples of recurring costs include
|
a. |
software |
|
b. |
data |
|
c. |
personnel |
|
d. |
systems |
23. A tangible benefit
|
a. |
can be |
|
b. |
might |
|
c. |
might |
|
d. |
all of the |
24. The systems steering committee is responsible
for all of the following except
|
a. |
assigning |
|
b. |
determining |
|
c. |
analyzing |
|
d. |
budgeting |
25. The accountant’s role in systems analysis
includes all of the following except
|
a. |
specify |
|
b. |
prepare data |
|
c. |
suggest |
|
d. |
ensure |
26. Which of the following is not an advantage of
commercial software? Commercial software
|
a. |
can be |
|
b. |
can be |
|
c. |
is |
|
d. |
is less |
27. Which step is least likely to occur when
choosing a commercial software package?
|
a. |
a detailed |
|
b. |
contact with |
|
c. |
preparation |
|
d. |
comparison |
28. The output of the detailed design phase of
the Systems Development Life Cycle (SDLC) is a
|
a. |
fully |
|
b. |
systems |
|
c. |
detailed |
|
d. |
systems |
29. There is often a conflict between the
attributes of
|
a. |
timeliness |
|
b. |
accuracy and |
|
c. |
relevance |
|
d. |
completeness |
30. Which is not true of direct data input forms?
|
a. |
errors |
|
b. |
calculations |
|
c. |
many data |
|
d. |
workers who |
Short Answer Questions (5
points each)
Instructions
Please answer each question fully. These are short answer questions that require
a few sentences to one paragraph to fully answer. Each response is worth 15 points.
1. How does the database approach solve the
problem of data redundancy?
2. Define resources, economic events, and agents.
3. Define
ERP.
4. Describe the three-tier client server
model.
5. What is a ping?
6. Explain
why accountants are interested in the legal feasibility of a new systems
project.
7. List
three advantages and one disadvantage of commercial software.
8. What
is the purpose of the Request for Proposal (RFP)?
9. Why should the tasks of systems
development and maintenance be segregated from operations?
Exam
Two Essays
Instructions
Please answer each question fully. These are essays and meant to be written in
several paragraphs. Each response is
worth 15 points.
1.
One purpose of a database
system is the easy sharing of data. But this ease of sharing can also
jeopardize security. Discuss at least three forms of access control designed to
reduce this risk.
2.
Discuss the key features of
Section 404 of the Sarbanes-Oxley Act.
3.
Does a qualified opinion on
management’s assessment of internal controls over the financial reporting
system necessitate a qualified opinion on the financial statements? Explain.
4.
Discuss the appropriate steps
to take when selecting a commercial software package.
5.
What are network protocols?
What functions do they perform?
6.
What is the fundamental concept
behind the rule of least access? Explain why this is a potential problem in an
ERP environment.
7.
Explain a database lockout and
the deadlock phenomenon. Contrast that to concurrency control and the
timestamping technique. Describe the importance of these items in relation to
database integrity.
8.
Explain how the one-time
password approach works.

