

Information Systems in Accounting Practice Exam
Course Introduction
This course explores the essential role of information systems in accounting, emphasizing how technology facilitates the collection, processing, and reporting of financial data. Students will examine computerized accounting systems, the design and control of accounting information systems, and the integration of enterprise resource planning (ERP) solutions. Topics include internal controls, data management, systems documentation, security and privacy issues, and the ethical use of accounting information. The course also addresses current trends, such as cloud computing and automation, to prepare students for effective decision-making and problem-solving in modern accounting environments.
Recommended Textbook
Accounting Information Systems 13th Edition by Marshall B. Romney
Available Study Resources on Quizplus
22 Chapters
1889 Verified Questions
1889 Flashcards
Source URL: https://quizplus.com/study-set/3389

Page 2

Chapter 1: Accounting Information Systems: an Overview
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/67263
Sample Questions
Q1) Which of the following statements below shows the contrast between data and information?
A) Data is the output of an AIS.
B) Information is the primary output of an AIS.
C) Data is more useful in decision making than information.
D) Data and information are the same.
Answer: B
Q2) The process of creating value for customers is the result of nine activities that form a A) value chain.
B) capitalist operation.
C) profitable business.
D) information system.
Answer: A
Q3) It is important that a firm's AIS collect and integrate financial and non-financial information about the organization's activities if the firm seeks use its AIS to gain a competitive advantage.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3
Chapter 2: Overview of Transaction Processing and Enterprise Resource Planning Systems
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/67252
Sample Questions
Q1) Changing an employee's hourly wage rate would be recorded where?
A) employee master file
B) employee transaction file
C) special journal
D) employee update file
Answer: A
Q2) Data about which of the following facets of a business activity is most likely to be recorded in a transaction file?
A) business activity
B) resources affected by the business activity
C) people who participate in the business activity
D) place the business activity occurs
Answer: A
Q3) The data processing method used by FedEx to track packages is an example of
A) real-time processing.
B) batch processing.
C) online batch processing.
D) real-time batch processing.
Answer: A

Page 4
To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Systems Documentation Techniques
Available Study Resources on Quizplus for this Chatper
102 Verified Questions
102 Flashcards
Source URL: https://quizplus.com/quiz/67248
Sample Questions
Q1) The Sarbanes-Oxley Act requires independent auditors to A) create flowcharts to document business processes.
B) understand a client's system of internal controls.
C) establish effective internal controls.
D) prepare and understand all types of system documentation.
Answer: B
Q2) Which symbol would be used in a flowchart to represent employee time cards sent by department managers to the payroll department?
A) #1
B) #4
C) #11
D) #16
Answer: A
Q3) Which symbol would be used in a flowchart to indicate the process started with the Human Resources department?
A) #1
B) #10
C) #12
D) #16
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Relational Databases
Available Study Resources on Quizplus for this Chatper
98 Verified Questions
98 Flashcards
Source URL: https://quizplus.com/quiz/67247
Sample Questions
Q1) Kai Keoni has created custom statues made out of scrap metal for over ten years.He lives above his shop in Martha's Vinyard,Maryland.Kai is an accounting fanatic and has kept detailed records of every statue he has ever created.For every sale,he obtains the customer's name and address,a description of the statue,and a picture of the statue sold to the customer.His unique style has recently attracted the attention of several celebrities.Ready to take his business to the next level,Kai has hired you to construct an accounting information system,which he wants modeled after his paper records.You begin development of the relational database that will form the core of the AIS by envisioning the record stored in a single table with a column that represents each attribute.You then begin to break this table down into smaller tables.This process is called A) integration. B) optimization. C) minimization. D) normalization.
Q2) Seacrest Bedding is changing from a file-oriented system to a relational database system.Identify and design at least three tables that would be needed to capture data for a sales transaction.Each table should include a primary key,three non-key attributes,and foreign keys as necessary.Make up data values for two records within each table.
To view all questions and flashcards with answers, click on the resource link above.
Page 6

Chapter 5: Computer Fraud
Available Study Resources on Quizplus for this Chatper
60 Verified Questions
60 Flashcards
Source URL: https://quizplus.com/quiz/67246
Sample Questions
Q1) Why is computer fraud often much more difficult to detect than other types of fraud?
A) because massive fraud can be committed in only seconds, leaving little-to-no evidence
B) because most perpetrators invest their illegal income rather than spend it, concealing key evidence
C) because most computer criminals are older and more cunning than perpetrators of other types of fraud
D) because perpetrators usually only steal very small amounts of money at a time, requiring a long period of time to pass before discovery
Q2) Misappropriation of assets is a fraudulent act that involves A) dishonest conduct by those in power.
B) misrepresenting facts to promote an investment.
C) using computer technology to perpetrate.
D) theft of company property.
Q3) Why is computer fraud on the rise?
Q4) What are some of the distinguishing characteristics of fraud perpetrators?
Q5) Describe two kinds of fraud.
Q6) Explain the impact of SAS No.99 on auditors' responsibilities.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Computer Fraud and Abuse Techniques
Available Study Resources on Quizplus for this Chatper
60 Verified Questions
60 Flashcards
Source URL: https://quizplus.com/quiz/67245
Sample Questions
Q1) Describe at least four social engineering techniques.
Q2) Jerry Schneider was able to amass operating manuals and enough technical data to steal $1 million of electronic equipment by A) scavenging.
B) skimming.
C) Internet auction fraud.
D) cyber extortion.
Q3) The unauthorized use of special program that bypass regular system controls to perform illegal acts is called
A) a Trojan horse.
B) a trap door.
C) the salami technique.
D) superzapping.
Q4) Pretexting is best described as a social engineering technique that uses A) text messages to gain sensitive information.
B) an invented scenario to gain sensitive information.
C) threat of physical force to gain sensitive information.
D) impersonation of somebody you know to gain sensitive information.
Q5) Describe at least six computer attacks and abuse techniques.
Q6) How can a system be protected from viruses?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Control and Accounting Information Systems
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/67244
Sample Questions
Q1) The definition of the lines of authority and responsibility and the overall framework for planning,directing,and controlling is laid out by the
A) control activities.
B) organizational structure.
C) budget framework.
D) internal environment.
Q2) Which component of the COSO Enterprise Risk Management Integrated Framework is concerned with understanding how transactions are initiated,data are captured and processed,and information is reported?
A) information and communication
B) internal environment
C) event identification
D) objective setting
Q3) Explain why the Foreign Corrupt Practices Act was important to accountants.
Q4) A neural network is a software program that has
A) the ability to read text.
B) the ability to learn.
C) the capability to extract information from an individual's brain.
D) the capability to inject information into an individual's brain.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Controls for Information Security
Available Study Resources on Quizplus for this Chatper
69 Verified Questions
69 Flashcards
Source URL: https://quizplus.com/quiz/67243
Sample Questions
Q1) The ________ disseminates information about fraud,errors,breaches and other improper system uses and their consequences.
A) chief information officer
B) chief operations officer
C) chief security officer
D) computer emergency response team
Q2) Information technology managers are often in a bind when a new exploit is discovered in the wild.They can respond by updating the affected software or hardware with new code provided by the manufacturer,which runs the risk that a flaw in the update will break the system.Or they can wait until the new code has been extensively tested,but that runs the risk that they will be compromised by the exploit during the testing period.Dealing with these issues is referred to as
A) change management.
B) hardening.
C) patch management.
D) defense in depth.
Q3) Describe what a man-trap is and how it contributes to information security.
Q4) Explain social engineering.
Q5) Identify six physical access controls.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Confidentiality and Privacy Controls
Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/67242
Sample Questions
Q1) Which of the following is not true regarding virtual private networks (VPN)?
A) VPNs provide the functionality of a privately owned network using the Internet.
B) Using VPN software to encrypt information while it is in transit over the Internet in effect creates private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys.
C) It is more expensive to reconfigure VPNs to include new sites than it is to add or remove the corresponding physical connections in a privately owned network.
D) The cost of the VPN software is much less than the cost of leasing or buying the infrastructure (telephone lines, satellite links, communications equipment, etc.) needed to create a privately owned secure communications network.
Q2) A process that takes plaintext of any length and transforms it into a short code.
A) asymmetric encryption
B) encryption
C) hashing
D) symmetric encryption
To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Processing Integrity and Availability Controls
Available Study Resources on Quizplus for this Chatper
81 Verified Questions
81 Flashcards
Source URL: https://quizplus.com/quiz/67262
Sample Questions
Q1) This batch processing data entry control sums a non-financial numeric field.
A) record count
B) financial total
C) hash total
D) sequence check
Q2) A customer failed to include her account number on her check,and the accounts receivable clerk credited her payment to a different customer with the same last name.Which control could have been used to most effectively to prevent this error?
A) closed-loop verification
B) duplicate values check
C) validity check
D) reconciliation of a batch control total
Q3) What control are file labels an example of?
A) data entry controls
B) output controls
C) processing controls
D) source data controls
Q4) Discuss how cloud computing could both positively and negatively affect system availability.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Auditing Computer-Based Information Systems
Available Study Resources on Quizplus for this Chatper
93 Verified Questions
93 Flashcards
Source URL: https://quizplus.com/quiz/67261
Sample Questions
Q1) How could auditors determine if unauthorized program changes have been made?
A) by interviewing and making inquiries of the programming staff
B) by examining the systems design and programming documentation
C) by using a source code comparison program
D) by interviewing and making inquiries of recently terminated programming staff
Q2) Andile Uzoma is the CEO of Chibuzo Incorporated.The board of directors has recently demanded that they receive more assurance that Chibuzo Incorporated is operating in an efficient,effective manner.Which type of audit would best suit the demands of the board of directors?
A) financial audit
B) information system audit
C) operational audit
D) sustainability audit
Q3) An auditor manually calculates accumulated depreciation on a delivery van and compares her calculation with the accounting records.The auditor is performing
A) vouching.
B) confirmation.
C) reperformance.
D) analytical review.
To view all questions and flashcards with answers, click on the resource link above.
Page 13

Chapter 12: The Revenue Cycle: Sales to Cash Collections
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/67260
Sample Questions
Q1) Which of the following is not a general threat to the revenue cycle?
A) inaccurate master data
B) loss of customers
C) poor performance
D) unauthorized disclosure of sensitive information
Q2) Which of the following poses an internal control problem?
A) Physical inspection of inventory quantity and condition is outsourced to a firm that specializes in this service.
B) Products are released from inventory after a warehouse employee and a shipping clerk both sign the pick list.
C) Sales representatives have authority to increase customers' credit limits in $1,000 increments.
D) When customer payments are received in the mail, checks are sent to the cashier's office and remittance advices are sent to the accounts receivable department.
Q3) Explain how validity checks,completeness tests and reasonableness tests can be implemented to ensure accuracy of customer orders.
Q4) Describe the basic revenue cycle activities.
Q5) Discuss the revenue cycle threat of stockouts,carrying costs,and markdowns.
To view all questions and flashcards with answers, click on the resource link above.
Page 14

Chapter 13: The Expenditure Cycle: Purchasing to Cash
Disbursements
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/67259
Sample Questions
Q1) What is the best way to prevent the acceptance of goods that were never ordered?
A) Order only from approved vendors.
B) Enforce an appropriate conflict of interest policy in place.
C) Match the packing slip to a purchase order before accepting delivery.
D) Require specific authorization from the purchasing manager before accepting any goods.
Q2) A reverse auction would likely be best suited to the purchase of
A) central processing units (CPUs).
B) soybeans.
C) designer clothing.
D) automobiles.
Q3) ________ attempts to minimize or eliminate carrying and stockout costs.
A) Just-in-time inventory
B) Materials requirements planning
C) Economic order quantity
D) Evaluated receipt settlement
Q4) How can using RFID tags or bar codes on goods or products provide significant benefit in the expenditure cycle?
Page 15
Q5) Discuss the differences between EOQ,MRP,and JIT.
Q6) Under what conditions is MRP more suitable than JIT and vice versa?
To view all questions and flashcards with answers, click on the resource link above.
Page 16

Chapter 14: The Production Cycle
Available Study Resources on Quizplus for this Chatper
86 Verified Questions
86 Flashcards
Source URL: https://quizplus.com/quiz/67258
Sample Questions
Q1) What is activity-based costing (ABC)? How does it compare with the traditional costing methods? What are the benefits of activity-based costing?
Q2) Identify and discuss the two common methods of production planning.
Q3) Labor productivity is measured by the quantity produced divided by the labor time required to produce it.All other things held constant,an increase in labor productivity will increase throughput by
A) increasing productive capacity.
B) increasing productive processing time.
C) increasing yield.
D) increasing all components of throughput.
Q4) The use of various forms of information technology in the production process is referred to as
A) computerized investments and machines.
B) computerized integration of machines.
C) computer-integrated manufacturing.
D) computer intense manufacturing.
Q5) Describe five threats in the production cycle and the applicable control procedures used to mitigate each threat.
Q6) Discuss the criticisms of traditional cost accounting methods.
Page 17
To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: The Human Resources Management and Payroll Cycle
Available Study Resources on Quizplus for this Chatper
77 Verified Questions
77 Flashcards
Source URL: https://quizplus.com/quiz/67257
Sample Questions
Q1) Identify the two types of payroll deductions and give two examples of each type.
Q2) Identify the firm below where employees' knowledge is likely to be more valuable than the value of a company's tangible assets.
A) international airline
B) law firm
C) automobile manufacturer
D) railroad
Q3) A payroll clearing account is used to
A) check the accuracy of payroll costs.
B) speed up payroll transaction processing.
C) reduce the transaction costs associated with payroll transaction processing.
D) eliminate the need to manually record payroll transactions.
Q4) The average annual management salary at Iyov Management is $80,000.If the average turnover rate for employees is ten per year,what is the approximate average annual cost of turnover?
A) $80,000
B) $400,000
C) $800,000
D) $1,200,000
Q5) Describe the basic activities in an HRM/payroll cycle.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 16: General Ledger and Reporting System
Available Study Resources on Quizplus for this Chatper
74 Verified Questions
74 Flashcards
Source URL: https://quizplus.com/quiz/67256
Sample Questions
Q1) IFRS is an acronym for what?
A) International Financial Reporting Standards
B) Internal Forensic Response System
C) Input and Financial Reporting Standards
D) Internal Fault Recovery System
Q2) Budgets used for internal planning purposes and performance evaluation should be developed on the basis of
A) responsibility accounting.
B) generally accepted accounting principles.
C) financial accounting standards.
D) managerial accounting standards.
Q3) What system privileges should an employee involved in the general ledger and reporting system be given?
A) general privileges to create, delete, update, or modify data
B) no privileges permitting the creation, deletion, updating, or modification of data
C) only the specific privileges necessary to perform an employee's assigned duties
D) read-only privileges
Q4) How is an audit trail used in the general ledger and reporting system?
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 17: Database Design Using the Rea Data Model
Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/67255
Sample Questions
Q1) Which of the following statements is true about the development of an REA model?
A) Events that pertain to the entry of data are included in the REA model.
B) The objective is to model basic value-chain activities.
C) REA diagrams model individual transactions and data collections.
D) Information retrieval events are modeled as events in the REA model.
Q2) Which of the following statements is false regarding REA diagrams?
A) Each organization will have its own unique REA diagram.
B) An REA diagram for a given organization will change over time.
C) Data modeling and REA diagram development involve complex and repetitive processes.
D) Redrawing an REA diagram several times during development is uncommon.
Q3) In which stage(s)of the database design process should accountants participate?
A) the systems analysis stage
B) the conceptual design stage
C) the implementation and conversion stage
D) in all of the stages above
Q4) Describe the three basic rules that apply to the REA model pattern.
Q5) Describe an REA data model.
Q6) Define minimum and maximum cardinalities.
Q7) Describe the steps in developing an REA diagram.
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 18: Implementing an Rea Model in a Relational Database
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/67254
Sample Questions
Q1) An integrated REA diagram merges multiple copies of some entities in order to A) minimize the repetition of agent entities.
B) maximize the legibility of the diagram by avoiding the need to have relationship lines cross one another.
C) Both A and B are true.
D) Both A and B are false.
Q2) When integrating separate REA diagrams,
A) common resources are placed between the events that affect them.
B) each resource is connected to two agents.
C) resources are duplicated to show the give and get of economic duality relationships.
D) resources are merged if both events in the stockflow relationship are modeled.
Q3) In an integrated REA diagram,every agent must be must be linked to A) at least one resource.
B) at least two resources.
C) at least one event.
D) at least two events.
Q4) What are the advantages of the REA data model over the traditional AIS model?
Q5) Explain a completeness check.
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 19: Special Topics in Rea Modeling
Available Study Resources on Quizplus for this Chatper
90 Verified Questions
90 Flashcards
Source URL: https://quizplus.com/quiz/67253
Sample Questions
Q1) The attributes of which type of entity would provide a way for the system to compare an employee's reimbursement request with the permissible range of the amount of reimbursement permitted?
A) Resources
B) Events
C) Agents
D) Type
Q2) In which entity would an item's standard cost information most likely be maintained?
A) Inventory entity
B) Order_Inventory entity
C) Inventory-Order_Inventory entity
D) none of the above
Q3) In which entity would an item's actual cost information most likely be maintained?
A) Inventory entity
B) Order_Inventory entity
C) Inventory-Order_Inventory entity
D) none of the above
Q4) Why might an REA diagram show relationships between resources and agents?
To view all questions and flashcards with answers, click on the resource link above.
22

Chapter 20: Introduction to Systems Development and Systems Analysis
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/67251
Sample Questions
Q1) One disadvantage of a Gantt chart is the fact that
A) it does not show the entire schedule for a project.
B) it does not show project progress.
C) it does not show relationships among project activities.
D) it does not permit an individual to quickly determine which activities are behind schedule.
Q2) Who is responsible for maintaining existing computer programs?
A) management
B) system programmers
C) systems analysts
D) accountants
Q3) Which of the following aspect of a feasibility study is concerned with meeting external reporting requirements?
A) technical feasibility
B) legal feasibility
C) scheduling feasibility
D) operational feasibility
Q4) Describe the four primary objectives of a systems survey conducted during systems analysis.
Q5) Describe the importance of the master plan in systems development.
To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 21: Ais Development Strategies
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/67250
Sample Questions
Q1) Which of the following about end-user computing is true?
A) System users know best what they need, so should be able to create their own applications.
B) End-users, while knowledgeable about their job, are not trained to create systems applications, and should not be allowed to do so.
C) It is inefficient and costly to ask the IS department to create basic applications that only a few users need to use.
D) In most companies, the IS department doesn't want end-users to create their own applications, for fear IS won't have enough work to do.
Q2) Identify the system below that end users should not be allowed to develop.
A) a payroll processing program
B) a program that performs "what-if" statistical modeling
C) developing an application using prewritten software such as a spreadsheet or database system
D) preparing a schedule or list such as a depreciation schedule
Q3) Describe outsourcing and identify the two types of outsourcing agreements.
Q4) Describe the purposes of a help desk.
Q5) Explain the concept of an application service provider.
To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 22: Systems Design, implementation, and Operation
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/67249
Sample Questions
Q1) Which of the following is not one of the ways data may need to be modified during data conversion?
A) resolve data inconsistencies
B) validate new files
C) identify files to be converted
D) remove unnecessary fields from data files
Q2) Which of the following is the final activity in the systems development life cycle?
A) monitoring of the system
B) ongoing maintenance activities
C) preparation of the post-implementation review report
D) user acceptance of the post-implementation review report
Q3) Which of the following is not one of the types of documentation that should be prepared for a new system?
A) management
B) operations
C) user
D) development
Q4) Describe the different types of documentation that should be prepared for a new system.
To view all questions and flashcards with answers, click on the resource link above. Page 25