Management Information Systems Exam Bank - 2238 Verified Questions

Page 1


Management Information Systems

Exam Bank

Course Introduction

Management Information Systems (MIS) explores the intersection of people, technology, and organizations to improve business processes and decision-making. The course covers the design, implementation, and management of information systems that support strategic and operational objectives. Students will examine core MIS concepts such as data management, communication networks, enterprise systems, e-commerce, and cybersecurity. Through case studies and practical applications, learners will develop an understanding of how information systems create business value, drive innovation, and address ethical and global challenges in the modern enterprise.

Recommended Textbook

Accounting Information Systems 14th GLOBAL Edition by Marshall B. Romney

Available Study Resources on Quizplus

22 Chapters

2238 Verified Questions

2238 Flashcards

Source URL: https://quizplus.com/study-set/3338

Page 2

Chapter 1: Conceptual Foundations of Accounting Information Systems

Available Study Resources on Quizplus for this Chatper

115 Verified Questions

115 Flashcards

Source URL: https://quizplus.com/quiz/66342

Sample Questions

Q1) The transaction cycle approach yields efficiencies when processing of a large number of transactions because

A)a large number of transactions within a given cycle can be categorized into a relatively small number of distinct types.

B)transaction cycles are easier to computerize.

C)the transaction cycle approach represents the natural order of business.

D)transaction cycles are easy to understand.

Answer: A

Q2) Define data,information,and how the value of information is determined.

Answer: Data: facts that are collected,entered,recorded,stored,and processed by an AIS.Information: data that has been organized and processed and is meaningful to its users.Such information is accessible,relevant,timely,reliable,verifiable,complete,and understandable.Information is of value when the benefits received from using or acting upon it outweigh the cost to produce the information.

Q3) Identify the components of an accounting information system.

Answer: A well-designed AIS consists of people,procedures and instructions,data,software,information technology infrastructures,and internal controls and security measures.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Overview of Transaction Processing and Enterprise Resource Planning Systems

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/66331

Sample Questions

Q1) Which of the following is an example of source data automation?

A)a utility bill

B)POS (point-of-sale)scanners in retail stores

C)a bill of lading

D)a subsidiary ledger

Answer: B

Q2) Which step below is not considered to be part of the data processing cycle?

A)data input

B)feedback from external sources

C)data storage

D)data processing

Answer: B

Q3) A typical source document could be

A)some type of paper document.

B)a computer data entry screen.

C)the company's financial statements.

D)both A and B

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Systems Documentation Techniques

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/66327

Sample Questions

Q1) Which symbol would be used in a flowchart to indicate a wireless connection between a laptop and the mainframe?

A)#13

B)#12

C)#11

D)#14

Answer: A

Q2) Which symbol would be used in a flowchart to represent a purchase order?

A)#2

B)#1

C)#5

D)#15

Answer: B

Q3) Graphical representations of information are often supplemented by A)narrative descriptions.

B)relevant e-mail communications.

C)logic charts.

D)oral descriptions from management.

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Relational Databases

Available Study Resources on Quizplus for this Chatper

113 Verified Questions

113 Flashcards

Source URL: https://quizplus.com/quiz/66326

Sample Questions

Q1) ________ in a well-structured relational database.

A)Every table must be related to all other tables

B)One table must be related to at least one other table

C)Every table must be related to at least one other table

D)One table must be related to all other tables

Q2) The database requirement that foreign keys must be null or have a value corresponding to the value of a primary key in another table is formally called the A)entity integrity rule.

B)referential integrity rule.

C)unique primary key rule.

D)foreign key rule.

Q3) A relational database in which vendor data is not maintained independently of purchase order data will most likely result in

A)an update anomaly.

B)an insert anomaly.

C)a delete anomaly.

D)an integrity anomaly.

Q4) Describe what you think will be the main impact of database technology in your career.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Computer Fraud

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/66325

Sample Questions

Q1) Which type of threat poses the greatest risk to information systems?

A)Software errors and equipment malfunctions

B)Unintentional acts

C)Intentional acts (computer crimes)

D)Natural and political disasters

Q2) Perhaps the most striking fact about natural disasters in relation to AIS controls is that

A)many companies in one location can be seriously affected at one time by a disaster.

B)losses are absolutely unpreventable.

C)there are a large number of major disasters every year.

D)disaster planning has largely been ignored in the literature.

Q3) Which of the following is the greatest risk to information systems and causes the greatest dollar losses?

A)Human errors and omissions

B)Physical threats such as natural disasters

C)Dishonest employees

D)Computer crime

Q4) Describe four ways companies can reduce losses from fraud.

Q5) What are some of the distinguishing characteristics of fraud perpetrators?

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Computer Fraud and Abuse Techniques

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/66324

Sample Questions

Q1) During a routine audit,a review of cash receipts and related accounting entries revealed discrepancies.Upon further analysis,it was found that figures had been entered correctly and then subsequently changed,with the difference diverted to a fictitious customer account.This is an example of A)kiting.

B)data diddling.

C)data leakage.

D)phreaking.

Q2) Maureen Boyd was arrested in Kansas City for running an online business that specialized in buying and reselling stolen credit card information.Maureen was charged with A)typosquatting.

B)carding.

C)pharming.

D)phishing.

Q3) Identify theft has always been a federal crime.

A)True

B)False

Q4) Describe the differences between a worm and a virus.

Q5) What is social engineering? Provide an example.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Control and Accounting Information Systems

Available Study Resources on Quizplus for this Chatper

132 Verified Questions

132 Flashcards

Source URL: https://quizplus.com/quiz/66323

Sample Questions

Q1) Upon acquiring a new computer operating system,management at Berryhill worried that computer virus might cripple the company's operation.Despite the concern,management did not think that the risk was high enough to justify the purchase of an anti-virus software.Berryhill chose to ________ the risk of being crippled by computer virus.

A)reduce

B)share

C)avoid

D)accept

Q2) Discuss the weaknesses in COSO's internal control framework that led to the development of the COSO Enterprise Risk Management framework.

Q3) Applying the COBIT5 framework,monitoring is the responsibility of

A)the CEO.

B)the CFO.

C)the board of directors.

D)all of the above

Q4) Explain why the Foreign Corrupt Practices Act was important to accountants.

Q5) Describe the five components of the COSO's Internal Control Model.

Q6) Why are most fraud not being reported or prosecuted?

Q7) Describe what is an event using the COSO definition and provide an example.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Controls for Information Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/66322

Sample Questions

Q1) Information security procedures protect information integrity by

A)preventing fictitious transactions.

B)reducing the system cost.

C)making the system more efficient.

D)making it impossible for unauthorized users to access the system.

Q2) According to the Trust Services Framework,the reliability principle of availability is achieved when the system produces data that

A)is available for operation and use at times set forth by agreement.

B)is protected against unauthorized physical and logical access.

C)can be maintained as required without affecting system availability, security, and integrity.

D)is complete, accurate, and valid.

Q3) Describe the differences between virtualization and cloud computing.

Q4) Security is a technology issue and not just a management issue.

A)True B)False

Q5) Describe what information security process the term hardening refers to.

Q6) Describe the steps in the security life cycle.

Q7) Explain the value of penetration testing.

Q8) Describe the concept of Internet of Things (IoT)and its security implications.

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Confidentiality and Privacy Controls

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/66321

Sample Questions

Q1) Which of the following is not one of the 10 internationally recognized best practices for protecting the privacy of customers' personal information?

A)Provide free credit report monitoring for customers.

B)Inform customers of the option to opt-out of data collection and use of their personal information.

C)Allow customers' browsers to decline to accept cookies.

D)Utilize controls to prevent unauthorized access to, and disclosure of, customers' information.

Q2) Identify the last step in protecting the confidentiality of intellectual property below.

A)Encrypt the information.

B)Control access to the information.

C)Train employees to properly handle the information.

D)Identify and classify the information to be protected.

Q3) What confidentiality and security risk does using VoIP present to organizations?

A)Internet e-mail communications can be intercepted.

B)Internet photographs can be intercepted.

C)Internet video can be intercepted.

D)Internet voice conversations can be intercepted.

To view all questions and flashcards with answers, click on the resource link above.

11

Chapter 10: Processing Integrity and Availability Controls

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/66341

Sample Questions

Q1) Sequentially prenumbered forms are an example of a(n)

A)data entry control.

B)data transmission control.

C)processing control.

D)input control.

Q2) A ________ ensures input data will fit into the assigned field.

A)limit check

B)size check

C)range check

D)field check

Q3) A ________ control ensures that the correct and most current files are being updated.

A)cross-footing balance test

B)data matching

C)file labels

D)write-protect mechanism

Q4) Discuss how cloud computing could both positively and negatively affect system availability.

Q5) Discuss ways that can help ensure the processing integrity of electronic voting.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Auditing Computer-Based Information Systems

Available Study Resources on Quizplus for this Chatper

116 Verified Questions

116 Flashcards

Source URL: https://quizplus.com/quiz/66340

Sample Questions

Q1) How could auditors determine if unauthorized program changes have been made?

A)By interviewing and making inquiries of the programming staff.

B)By examining the systems design and programming documentation.

C)By using a source code comparison program.

D)By interviewing and making inquiries of recently terminated programming staff.

Q2) Expanding a firm's operations to include a manufacturing facility overseas will

A)reduce inherent risk.

B)reduce control risk.

C)increase inherent risk.

D)increase control risk.

Q3) Which of the following is not one of the types of internal audits?

A)A review of the corporate organizational structure and reporting hierarchies.

B)An examination of procedures for reporting and disposing of hazardous waste.

C)A review of source documents and general ledger accounts to determine integrity of recorded transactions.

D)A comparison of estimates and analysis made before purchase of a major capital asset to actual numbers and results achieved.

Q4) There is a direct relationship between inherent risk and detection risk.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: The Revenue Cycle: Sales to Cash Collections

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/66339

Sample Questions

Q1) A credit sale should always be reviewed by a credit manager if it exceeds the customer's credit limit.

A)True

B)False

Q2) Basic segregation of duties requires the credit manager reports to the ________ and the treasurer report to the ________.

A)treasurer; controller

B)treasurer; vice president of finance

C)controller; vice president of finance

D)marketing manager; vice president of finance

Q3) A monthly statement sent to customers serves a control purpose by

A)providing an opportunity for customers to verify the balance owed and activity on the account.

B)triggering the process to record a customer payment.

C)summarizing invoices and amounts due for customers.

D)reminding customers of the balance due and due date.

Q4) What is QR codes and can companies use them to improve interactions with their customers?

Q5) Describe typical credit approval procedures.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: The Expenditure Cycle: Purchasing to Cash

Disbursements

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/66338

Sample Questions

Q1) Once a vendor is selected for a product,the vendor's identity is recorded in the

A)purchase requisition transaction file.

B)purchase requisition master file.

C)inventory transaction file.

D)inventory master file.

Q2) Which of the following is not an advantage of a voucher system?

A)Several invoices may be included on one voucher, reducing the number of checks.

B)Disbursement vouchers may be pre-numbered and tracked through the system.

C)The time of voucher approval and payment can be kept separate.

D)It is a less expensive and easier system to administer than other systems.

Q3) There is a symmetrical interdependence between a firm's expenditure cycle and its suppliers'

A)production cycle.

B)revenue cycle.

C)expenditure cycle.

D)general ledger and reporting system.

Q4) In a supplier audit,what are some of the red flags that could indicate potential supplier's problems?

Q5) Describe the function of an imprest fund.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: The Production Cycle

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/66337

Sample Questions

Q1) "Push manufacturing" is also known as

A)manufacturing resource planning (MRP).

B)just-in-time manufacturing system (JIT).

C)the economic order quantity (EOQ)system.

D)ahead-of-time production implementation (ATPI).

Q2) What issue did Airbus encounter when using CAD software to help design the A380 Superjumbo airliner?

A)The actual A380 was heavier than the CAD model.

B)The actual A380 was not able to carry as much weight as the CAD model.

C)Design teams used different versions of the same CAD software, resulting in key information loss.

D)The CAD software was not advanced enough to help design the A380.

Q3) The use of various forms of information technology in the production process is referred to as

A)computerized investments and machines.

B)computerized integration of machines.

C)computer-integrated manufacturing.

D)computer intense manufacturing.

Q4) What is PLM and how management can use it to improve product design?

Q5) Discuss the role the accountant can play in the production cycle.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: The Human Resources Management and Payroll Cycle

Available Study Resources on Quizplus for this Chatper

86 Verified Questions

86 Flashcards

Source URL: https://quizplus.com/quiz/66336

Sample Questions

Q1) The results of an internal audit finds that there is a problem with inaccurate time data being entered into the payroll system.What is an applicable control that can help prevent this event from occurring in the future?

A)Proper segregation of duties.

B)Automation of data collection.

C)Sound hiring procedures.

D)Review of appropriate performance metrics.

Q2) Which type of payroll report lists the voluntary deductions for each employee?

A)Payroll register.

B)Deduction register.

C)Employee earnings statement.

D)Federal W-4 form.

Q3) Professional employer organizations (PEOs)are especially attractive to small and mid-sized businesses for all of the following reasons except

A)reduced costs.

B)wider range of benefits.

C)freeing up computer resources.

D)improved service quality.

Q4) Why are accurate cumulative earnings records important?

17

To view all questions and flashcards with answers, click on the resource link above.

Chapter 16: General Ledger and Reporting System

Available Study Resources on Quizplus for this Chatper

83 Verified Questions

83 Flashcards

Source URL: https://quizplus.com/quiz/66335

Sample Questions

Q1) Identify the year the SEC will require American companies to switch from U.S.-based GAAP to IFRS as the basis for preparing financial statements.

A)2016

B)2018

C)2020

D)At this point it is unclear when the SEC will require American companies to implement IFRS, though the SEC remains committed to requiring U.S. companies use IFRS at some point.

Q2) Which type of graph is the most commonly used to display trends in financial data?

A)Pie chart.

B)Scatterplot chart.

C)Bar chart.

D)Stochastic chart.

Q3) Standard XBRL taxonomies can cover most accounting situations.

A)True

B)False

Q4) Explain the benefits of XBRL.

Q5) Discuss the value and role of budgets as managerial reports.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Database Design Using the Rea Data Model

Available Study Resources on Quizplus for this Chatper

90 Verified Questions

90 Flashcards

Source URL: https://quizplus.com/quiz/66334

Sample Questions

Q1) An entity-relationship diagram

A)can represent the contents of any database.

B)is only used in conjunction with REA models.

C)can show a limited number of entities and relationships.

D)is used only to design new databases.

Q2) Describe what is a E-R diagram and provide an example.

Q3) What is the standard cardinality pattern for a relationship between an event and an agent?

A)1:1.

B)0:1.

C)0:N.

D)1:N.

Q4) What is the minimum number of external agents that must participate in each REA event?

A)0

B)2

C)1

D)3

Q5) Describe the steps in developing an REA diagram.

Q6) Define minimum and maximum cardinalities.

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Implementing an Rea Model in a Relational Database

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/66333

Sample Questions

Q1) Identify the attribute below that would not make a good primary key.

A)Postal code.

B)Social security number.

C)A unique number automatically generated by the system.

D)Cell phone number.

Q2) When integrating multiple REA diagrams into an integrated REA diagram,merging redundant resources

A)always affects minimum cardinalities associated with the merged event.

B)sometimes affects minimum cardinalities associated with the merged event.

C)never affects minimum cardinalities associated with the merged event.

D)none of the above

Q3) In a relational database designed according to the REA model,where is information about an organization's liabilities generally stored?

A)Resource entities.

B)Agent entities.

C)Event entities.

D)All of the above.

Q4) Explain where in the REA model you can find the information normally found in a journal.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 19: Special Topics in Rea Modeling

Available Study Resources on Quizplus for this Chatper

98 Verified Questions

98 Flashcards

Source URL: https://quizplus.com/quiz/66332

Sample Questions

Q1) If the actual cost of an inventory item is maintained as an attribute in the Inventory table,which inventory valuation method would an organization have to use?

A)LIFO.

B)FIFO.

C)Weighted Average.

D)Specific Identification.

Q2) Explicitly identifying the different employees who participate in each event by their job functions is helpful when verifying A)internal controls.

B)job descriptions.

C)proper supervision.

D)segregation of duties.

Q3) Describe the four main events of interest included in a typical production cycle REA diagram.

Q4) Supplier number is most likely to be a foreign key in A)Inventory-Request_Inventory.

B)Receive Inventory.

C)Supplier.

D)Warehouse.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 20: Introduction to Systems Development and Systems Analysis

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/66330

Sample Questions

Q1) In which systems analysis step do analysts conduct an extensive study of the present system to gain a thorough understanding of how it works?

A)Feasibility study.

B)Information needs and requirements.

C)Systems analysis report.

D)Systems survey.

Q2) The question of what the project should and should not accomplish is determined in what step of systems analysis?

A)Feasibility study.

B)Initial investigation.

C)Systems analysis report.

D)Systems survey.

Q3) Which of the following activities is performed during the systems development life cycle?

A)Assessing the ongoing feasibility of the project.

B)Managing the behavioral reactions to change.

C)Planning.

D)All of the above activities are performed during the life cycle.

Q4) Describe the importance of the master plan in systems development.

To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Ais Development Strategies

Available Study Resources on Quizplus for this Chatper

117 Verified Questions

117 Flashcards

Source URL: https://quizplus.com/quiz/66329

Sample Questions

Q1) Describe computer-aided software (or systems)engineering (CASE)and identify the advantages and disadvantages of CASE?

Q2) Identify one of the primary risks associated with end-user computing below.

A)IS personnel will not have enough work to do if users develop their own systems.

B)Systems that have not been adequately tested may be implemented.

C)System costs may skyrocket.

D)System development time may increase substantially.

Q3) The IT department should be given control of end-user computing (EUC).

A)True

B)False

Q4) Which of the following is a system that automates and facilitates business process improvements throughout the system development life cycle?

A)Business process reengineering system (BPRS).

B)Business process innovation system (BPIS).

C)Business process management system (BPMS).

D)Business process diagramming system (BPDS).

Q5) What are the three methods to obtain a new information system? What is a turnkey system?

To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 22: Systems Design, implementation, and Operation

Available Study Resources on Quizplus for this Chatper

105 Verified Questions

105 Flashcards

Source URL: https://quizplus.com/quiz/66328

Sample Questions

Q1) Yasin,a professional in information technology services,received an e-mail from Adil in the Sales Department.The e-mail read: "Yasin,I need you to run that inventory report you prepared for me last month again.Please send it to me by e-mail.Thank you,Adil." What type of report is Adil asking Yasin to provide?

A)Scheduled report.

B)Special-purpose analysis report.

C)Triggered exception report.

D)Demand report.

Q2) Ideally,employees should receive training on a new system A)as soon as possible.

B)right after the physical design.

C)during implementation planning.

D)just before system testing and conversion.

Q3) Performing revisions to existing program code is an example of A)debugging.

B)structured programming.

C)program maintenance.

D)walk through.

Q4) What are the purposes of a conceptual systems design report?

Q5) Describe the approaches to system conversion.

To view all questions and flashcards with answers, click on the resource link above. Page 24

Turn static files into dynamic content formats.

Create a flipbook