Midterm Exam- Fall 2009- Students Copy

Midterm Exam- Fall 2009- Students Copy - Fall 2009 ACC 3354...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Fall 2009, ACC 3354, Midterm, Open Book Take Home Quiz, Hardcopy Submission Deadline Friday 10-23-09 (bring it in the class), Weight 35 percent Name__________________________ True/False Questions: 1. Information is a business resource. ANS: T PTS: 1 2. Information lacking reliability may still have value. ANS: F PTS: 1 3. The Management Reporting System provides the internal financial information needed to manage a business. ANS: T PTS: 1 4. Systems development represents 80 to 90 percent of the total cost of a computer system. ANS: F PTS: 1 5. Information Technology (IT) audits can be performed by both internal and external auditors. ANS: T PTS: 1 6. The flat-file approach is most often associated with so-called legacy systems. ANS: T PTS: 1 7. Employees should be made aware of the firm’s commitment to ethics. ANS: T PTS: 1 8. Source code is an example of intellectual property. ANS: T PTS: 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Name__________________________ 9. Segregation of duties is an example of an internal control procedure. ANS: T PTS: 1 10. Ethical issues and legal issues are essentially the same. ANS: F PTS: 1 11. Individuals with access authority to general ledger accounts should not prepare journal vouchers. ANS: T PTS: 1 12. Management reporting is often called discretionary reporting because it is not mandated as is financial reporting. ANS: T PTS: 1 13. Standards are the basis for evaluating actual performance. ANS: T PTS: 1 14. To the user, data processing procedures for routine transactions, such as entering sales orders, appear to be identical in the database environment and in the traditional environment. ANS: T PTS: 1 15. Under the database approach, data is viewed as proprietary or “owned” by users. ANS: F PTS: 1 16. A lockout is a software control that prevents multiple users from simultaneous access to data. ANS: T PTS: 1 17. Improperly normalized databases are associated with three types of anomalies: the update anomaly, the insertion anomaly, and the deletion anomaly. ANS: T PTS: 1 18. The recommended data architecture for an ERP includes separate operational and data warehouse databases. ANS: T PTS: 1 19. ERP systems support a smooth and seamless flow of information across organizations. ANS: T PTS: 1
Background image of page 2
Name__________________________ 20. OLAP stands for on-line application processing. ANS: F PTS: 1 21. The primary goal of installing an ERP system is achieving business process reengineering to improve customer service, reduce production time, increase productivity, and improve decision- making. ANS: T PTS: 1 22. Day-to-day transactions are stored in the operational database. ANS: T PTS: 1 23. A data warehouse is a multi-dimensional database that may require hundreds of gigabytes of storage. ANS: T
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/07/2011 for the course ACC 3354 taught by Professor Tesher during the Fall '10 term at St. John's.

Page1 / 12

Midterm Exam- Fall 2009- Students Copy - Fall 2009 ACC 3354...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online