AIS Notes
AIS Notes
Chapter 1
2. The objectives of the data collection activity of the general model for Accounting Information
Systems are to collect data that are:
a. relevant and redundant.
b. efficient and objective.
c. efficient and redundant.
d. efficient and relevant.
12. Which of the following best describes the activities of the accounting function?
a. inventory control, accounts payable, fixed assets, and payroll
b. fixed assets, accounts payable, cash disbursements, and cost accounting
c. purchasing, cash receipts, accounts payable, cash disbursements, and payroll
d. inventory control, cash receipts, accounts payable, cash disbursements, and payroll
e. inventory control, cost accounting, accounts payable, cash disbursements, and payroll
Chapter 2
1. Which of the following is not an advantage of real-time processing of files over batch
processing?
a. shorter transaction processing time
b. reduction of inventory stocks
c. improved customer service
d. all are advantages
e. none of the above are advantages
a. airline reservations
b. point-of-sale transactions
c. weekly processing of payroll checks
d. air traffic control system
e. all of the above are real-time systems
8. Which of the following is true of the relationship between subsidiary ledgers and general ledger
accounts?
a. The two contain different and unrelated data
b. The relationship between the two constitute part of the audit trail.
c. All general ledger accounts have subsidiaries
d. The total of subsidiary ledger accounts usually exceeds the total in the related general ledger
accounts
11. An invoice file would best be coded using a(n) coding ___ scheme.
a. alphabetic
b. mnemonic
c. block
d. sequential
13. A documentation tool that depicts the physical flow of information relating to a particular
transaction through an organization is a(n)
a. ER diagram d. decision table
b. system flowchart e. data flow diagram
c. program flowchart
14. A coding scheme in the form of acronyms and other combinations that convey meaning is a(n)
a. sequential code c. alphabetic code
b. mnemonic code d. block code
17. Which statement is NOT correct? The virtual storage access method
a. is used for very large files that need both direct access and batch processing.
b. may use an overflow area for records.
c. provides an exact physical address for each record.
d. is appropriate for files that require few insertions or deletions.
20. The production subsystem of the conversion cycle includes all of the following EXCEPT
a. make-or-buy decisions on components part
b. determining raw materials requirements
c. release of raw materials into production
d. scheduling the goods to be produced
Chapter 3
5. In an automated payroll processing environment, a department manager substituted the time card
for a terminated employee with a time card for a fictitious employee. the fictitious employee had
the same pay rate and hours worked as the terminated employee. the best control technique to
detect this action using employee identification numbers would be to use a:
a. batch total
b. record count
c. hash total
d. subsequent check
e. Financial total
11. What name is given to computer programs that are used for checking the validity and accuracy of
transaction data?
a. Operating system programs
b. Edit programs
c. Compiler programs
d. Integrated test programs
e. Interrogation programs
12. An employee in the receiving department keyed in a shipment from a remote terminal and
inadvertently omitted the purchase order number. The best application control to detect this error
would be a
a. Batch total
b. Missing data check
c. Completeness check
d. Reasonable test
e. Compatibility test
13. Which of the following controls would best prevent the lapping of accounts receivable?
a. Segregate duties so that the clerk responsible for recording in the accounts receivable
subsidiary ledger has no access to the general ledger
b. Request that customers review their monthly statements and report unrecorded cash
payments
c. Separate the tasks of depositing cash receipts and posting to the AR sub ledger
d. Request the customers make checks payable to the company
14. Ensuring that all material transactions processed by the information system are valid and in
accordance with management's objectives is an example of
A. Transaction authorization
B. Supervision
C. Accounting Records
D. Independent Verification
16. Providing timely information about transactions in sufficient detail to permit proper classification
and financial reporting is an example of
a. The control environment
b. Risk assessment
c. Information and communication
d. monitoring
17. The fraud scheme that is similar to the concept of "borrowing from Peter to pay Paul" is
a. Expense account fraud
b. Bribery
c. Lapping
d. Transaction fraud
18. What is the process for posting to accounting records in a computer system?
a. Mater file is updated to a transaction file
b. Master file is updated to an index file
c. Transaction file is updated to a master file
d. Master file is updated to year-to-date file
e. Current balance file is updated to an index file
Chapter 4
4. Which control helps to ensure that the inventory items shipped to the customer are the correct
type and the correct amount?
A. Reconciliation BOL and shipping notice
B. Issuance of a blind copy of purchase order
C. Reconcile stock release document and packing slip
D. The way watch