

Enterprise Resource Planning Systems
Exam Review
Course Introduction
Enterprise Resource Planning (ERP) Systems focuses on the integrated management of core business processes, typically in real time and mediated by software and technology. This course explores the fundamental concepts, architecture, and implementation of ERP systems, emphasizing their role in streamlining operations across departments such as finance, human resources, supply chain, and customer relationship management. Students will analyze selected ERP platforms, examine best practices for successful adoption, and evaluate the impact of ERP on organizational efficiency and competitiveness. Practical case studies and hands-on activities provide students with experience in configuring, customizing, and optimizing ERP solutions to meet organizational needs.
Recommended Textbook
Accounting Information Systems 11th Edition by George H. Bodnar
Available Study Resources on Quizplus
14 Chapters
1942 Verified Questions
1942 Flashcards
Source URL: https://quizplus.com/study-set/3390

Page 2

Chapter 1: Accounting Information Systems: An Overview
Available Study Resources on Quizplus for this Chatper
161 Verified Questions
161 Flashcards
Source URL: https://quizplus.com/quiz/67264
Sample Questions
Q1) Application ________ involves the process of ensuring the suite of organization's applications work together in order to meet organizational goals and objectives.
Answer: architecture
Q2) The three major categories of waste under the original Toyota Production System (TPS)are ________,________,and ________.
Answer: muda,muri,and mura
Q3) Green IT states system design should include a plan for recycling and reusing system components.
A)True
B)False
Answer: True
Q4) The three general phases of systems development projects and the order in which they occur are
A) systems design, systems implementation, and systems analysis.
B) systems design, systems implementation, and systems auditing.
C) systems design, systems analysis, and systems programming.
D) systems analysis, systems design, and systems implementation.
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
3

Chapter 2: Systems Techniques and Documentation
Available Study Resources on Quizplus for this Chatper
134 Verified Questions
134 Flashcards
Source URL: https://quizplus.com/quiz/67277
Sample Questions
Q1) The two categories of diagrams under the UML version 2.4 include ________ diagrams.
A) structure and iteration
B) behavior and iteration
C) structure and behavior
D) form and interaction
Answer: C
Q2) Systems techniques may be used by
A) internal auditors.
B) external auditors.
C) systems personnel.
D) All of these answers are correct.
Answer: D
Q3) The usual focus of an audit is to review an existing system rather than design a new system.
A)True
B)False
Answer: True
Q4) Preparing flowcharts can be viewed as more ________ than ________.
Answer: art; science
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Ebusiness and Ecommerce
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/67276
Sample Questions
Q1) The enterprise architecture describes the joint structure and behavior of the enterprise and its information system.
A)True
B)False
Answer: True
Q2) Privacy is a major issue in electronic transactions.Therefore,the Internet should not be used if
A) a bank uses a different digital signature for each denomination of currency. B) digital signatures need to be issued for coins used in electronic transactions.
C) the IP address of one of the parties to a transaction needs to remain fully confidential. D) All of these answers are correct.
Answer: C
Q3) The technique of ________ permits bank to issue digital cash so that it is unable to link the payer to the payee.
Answer: blinding
Q4) Digital IDs are issued by a(n)________ ________.
Answer: certifying authority
To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Transaction Processing and the Internal Control Process
Available Study Resources on Quizplus for this Chatper
133 Verified Questions
133 Flashcards
Source URL: https://quizplus.com/quiz/67275
Sample Questions
Q1) Internal control should be looked upon as part of a larger process within the organization.
A)True
B)False
Q2) An example of a suspense file is a file of back-ordered items awaiting shipment to customers.
A)True
B)False
Q3) Selecting the best opportunities and managing uncertainties is part of Enterprise Risk Management (ERM).
A)True
B)False
Q4) The Omnibus Trade and Competitiveness Act of 1988 (OTCA)amends the A) Securities Exchange Act of 1934.
B) accounting provisions of the FCPA.
C) antibribery provisions of the FCPA.
D) accounting and antibribery provisions of the FCPA.
Q5) ISO 27002 aids companies with Section ________ compliance.
Page 6
Q6) White-collar crime that benefits an organization rather than individuals is ________ crime.
To view all questions and flashcards with answers, click on the resource link above.
Page 7
Chapter 5: Fraud Examination and Fraud Management
Available Study Resources on Quizplus for this Chatper
132 Verified Questions
132 Flashcards
Source URL: https://quizplus.com/quiz/67274
Sample Questions
Q1) In law enforcement circles,surreptitious observation is called A) clandestine observation.
B) invigilation.
C) surveillance.
D) all of the above
Q2) The method that begins with numbers in accounts and follows them backward to the source documents is called ________.
Q3) Benford analysis exploits the pattern relating to the first digit of numbers appearing in a random data set.
A)True
B)False
Q4) The solution to prevent employees from stealing cash in the mailroom is to have ________ employees work together.
Q5) Before an expert can be permitted to testify,he or she must first demonstrate ________ ________.
Q6) Loss recovery options include accepting the loss,collecting insurance if available,and pursuing the perpetrator in court.
A)True
B)False

Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Information Systems Security
Available Study Resources on Quizplus for this Chatper
170 Verified Questions
170 Flashcards
Source URL: https://quizplus.com/quiz/67273
Sample Questions
Q1) Viruses and denial of service attacks are examples of A) electronic interception.
B) spyware.
C) malware.
D) exploits.
Q2) Pretexting and phishing are forms of social engineering.
A)True
B)False
Q3) Direct observation includes shoulder surfing and dumpster diving.
A)True
B)False
Q4) A company which specializes in processing the data of other companies,but not its own,is a(n)
A) computer service bureau.
B) commercial vendor of disaster services.
C) emergency response center.
D) flying-start site.
Q5) Computer security and information security mean the same thing.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 7: Electronic Data Processing Systems
Available Study Resources on Quizplus for this Chatper
126 Verified Questions
126 Flashcards
Source URL: https://quizplus.com/quiz/67272
Sample Questions
Q1) Program data editing is often used in place of verification.
A)True
B)False
Q2) Which application would not be ideally suited to processing by an OLRS system?
A) Payroll
B) On-line reservations
C) Inventory control
D) Customer accounts
Q3) The "amount due" field of a bill is checked to ensure that the sign is positive.This is an example of a field
A) sign check.
B) length check.
C) format check.
D) type check.
Q4) Computer processing of accounting data is typically a(n)________ procedure.
Q5) All electronic input systems are referred to as on-line input systems.
A)True
B)False
Q6) The ________ has enhanced the real-time sales system by extending it to customers who are off-site.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Revenue Cycle Processes
Available Study Resources on Quizplus for this Chatper
125 Verified Questions
125 Flashcards
Source URL: https://quizplus.com/quiz/67271
Sample Questions
Q1) ________ is an information system that enables the implementation of sophisticated and flexible customer-specific and material-specific pricing procedures.
Q2) The SEC Interpretive Guidance "Management's Report on Internal Control Over Financial Reporting" approved in 2007,focuses management on internal controls that best protect against risk of material ________ in financial statements.
A) fraud
B) misstatements
C) negligence
D) mistakes
Q3) The amount of cash receipts for August 12 is $6,389.42.For general ledger to post this amount,it must receive
A) a journal voucher from cash receipts.
B) the deposit slip from the bank for August 12 showing $6,389.42 as a deposit.
C) a control total from accounts receivable.
D) a journal voucher from cash receipts and a control total from accounts receivable.
Q4) In the SAP ERP system,all of the information that pertains to a customer is stored in a(n)________ ________ record.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Procurement and Human Resources Business
Processes
Available Study Resources on Quizplus for this Chatper
118 Verified Questions
118 Flashcards
Source URL: https://quizplus.com/quiz/67270
Sample Questions
Q1) A purchase order is an internal document created to request the procurement of something so that it is available at a certain point in time.
A)True
B)False
Q2) An employer is responsible for the full amount of federal payroll taxes even when he or she fails to withhold the appropriate contributions from employees.
A)True
B)False
Q3) Goods receipt documents can be prepared in several ways.Which way below would not be used when preparing a goods receipt document?
A) By the Inventory Management system
B) By allowing accounts payable to prepare the document
C) By reference to the purchase order
D) Posting the goods receipt document into quality inspection
Q4) Management and auditors must be concerned with evaluating the existence and functioning of controls as they are necessary to protect against the risk of ________ misstatements.
Q5) ________ documents are used in the selection of a vendor.
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: The Production Business Process
Available Study Resources on Quizplus for this Chatper
127 Verified Questions
127 Flashcards
Source URL: https://quizplus.com/quiz/67269
Sample Questions
Q1) Radio-frequency identification is an automatic identification technology that uses
A) high frequency radio waves to send and receive data between RFID tags and readers.
B) low power radio waves to send and receive data between RFID tags and readers.
C) bar codes to eliminate the need for direct line of sight to the RFID tags.
D) radio waves to send and receive data between bar coded tags.
Q2) Production volume is one way to measure a cost driver.
A)True
B)False
Q3) Reorder point is calculated as the purchasing cost per order multiplied by the average inventory usage rate.
A)True
B)False
Q4) Systems that incorporate programmable production processes that can be quickly reconfigured to produce different types of products are called ZIPS.
A)True
B)False
Q5) ________ ________ scanners require a direct line of sight in order to function.
To view all questions and flashcards with answers, click on the resource link above.
13

Chapter 11: Systems Planning, analysis, and Design
Available Study Resources on Quizplus for this Chatper
161 Verified Questions
161 Flashcards
Source URL: https://quizplus.com/quiz/67268
Sample Questions
Q1) In iterative or agile approaches to systems development
A) each phase of the life cycle is completed prior to moving to the next phase.
B) phases can be started in any order the project manager deems appropriate.
C) all phases of the life cycle are carried on simultaneously.
D) the systems development life cycle is not appropriate to implement.
Q2) Model driven architecture is the main architecture used in traditional systems design approaches.
A)True
B)False
Q3) Regarding general systems design considerations,implementing adequate controls is too often emphasized.
A)True
B)False
Q4) Another name for the traditional approach to the systems development life cycle is the ________ method.
Q5) The systems development strategic plan should identify specific areas to be given the highest priority.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Systems Project Management, implementation, operation, control
Available Study Resources on Quizplus for this Chatper
133 Verified Questions
133 Flashcards
Source URL: https://quizplus.com/quiz/67267
Sample Questions
Q1) For an applications system project,the individual who should be included in the project team because he or she has the best working knowledge of how the application should function in the actual work environment is
A) an analyst.
B) the chief information officer.
C) a computer programmer.
D) a representative from the user department for which the application is being developed.
Q2) The SPICE approach categorizes processes into five broad areas and scores "capability level" on a 10-point scale.
A)True
B)False
Q3) Audits of information systems often focus on internal control.
A)True
B)False
Q4) The ________ ________ Framework provides a structured environment in which to develop software.
Q5) What is the project development environment? Explain the major components within this environment.
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 13: Data Management Concepts
Available Study Resources on Quizplus for this Chatper
143 Verified Questions
143 Flashcards
Source URL: https://quizplus.com/quiz/67266
Sample Questions
Q1) Describe the duties of the database administrator (DBA)regarding the data dictionary.
Q2) Describe how list organization and multilist organization work in tree and network databases.Also,distinguish between a list structure and a ring structure in the implementation of tree and network structures.How does the list organization make database maintenance difficult? Under what circumstances is the list organization effective?
Q3) Variable-length records are easier to manipulate than fixed-length records because the size of the variable-length record is generally smaller than the fixed-length record.
A)True B)False
Q4) The "C" in ACID stands for A) completeness. B) consistency. C) conventional. D) conceptual.
Q5) The terms field,data item,attribute,and element are synonyms. A)True B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 14: Auditing Information Technology
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/67265
Sample Questions
Q1) Total audit cost is increased significantly when some audit resources are directed at reviewing and verifying the internal controls that exist in a system.
A)True
B)False
Q2) An IT governance framework such as ________ can be a critical element in ensuring proper control and governance over information and the systems that create,store,manipulate,and retrieve that information.
A) CISA
B) SOA
C) COBIT
D) RBA
Q3) ________ is an IT governance professional certification for individuals who manage,design,oversee,and assess an enterprise's information security program.
Q4) The snapshot technique involves capturing and dumping
A) selected transaction data.
B) the program code itself.
C) selected master file contents.
D) selected memory contents.
To view all questions and flashcards with answers, click on the resource link above. Page 17