ACCOUNTING INFORMATION SYSTEMS 9TH EDITION BY ULRIC GELINAS, RICHARD DULL, PATRICK WHEELER TEST BANK

Page 1

TEST BANK


ACCOUNTING INFORMATION SYSTEMS 9TH EDITION BY ULRIC GELINAS, RICHARD DULL, PATRICK WHEELER TEST BANK Chapter 1--Introduction to Accounting Information Systems Student: 1. The three themes of the text are operating systems, e-business, and internal control. True False

2. In an assurance service the accountant will provide the original information used for decision making. True False

3. Information systems reliability and electronic commerce have been identified by the AICPA as potential assurance services. True False

4. E-business is the application of electronic networks to undertake business processes among the functional areas in an organization. True False

5. The role of the accountant has evolved to include non-financial information and information technology. True False

6. Enterprise systems integrate an organization's business processes and information from all of an organization's functional areas. True False

7. An information system consists of an integrated set of computer-based and manual components established to provide information to users. True False

8. Internal control is a process that provides complete assurance that the organization is meeting its objectives,


such as efficiency and effectiveness of operations and reliable reporting. True False


9. The Sarbanes-Oxley Act of 2002 has dramatically changed the daily work of financial accountants and auditors. True False

10. According to the Sarbanes-Oxley Act of 2002, management must identify, document, and evaluate significant internal controls. True False

11. According to the Sarbanes-Oxley Act of 2002 and PCAOB Auditing Standard No. 5, management must audit and report on auditors' assertions about the organizations' systems of internal controls. True False

12. According to the Sarbanes-Oxley Act's Section 409, material changes in the organization's financial condition must be disclosed to the public on a rapid and current basis. True False

13. The Sarbanes-Oxley Act's Section 404 creates changes in both how companies document and evaluate internal control and how auditors audit and report on internal control. True False

14. Sarbanes-Oxley Section 404 compliance is a major line of business for the biggest accounting firms. True False

15. The Sarbanes Oxley Act of 2002 applies to publicly traded companies and not-for-profit entities. True False

16. Historically the purpose of an accounting information system is to collect, process, and report financial aspects of business events. True False

17. The MIS is a subsystem of the AIS. True False


18. Sales/marketing information system is traditionally part of the AIS. True False

19. Billing/accounts receivable is traditionally part of the AIS. True False

20. Production and personnel are part of the operations process. True False

21. The management process includes marketing and sales. True False

22. Information that is capable of making a difference in a decision-making situation, by reducing uncertainty or increasing knowledge for that particular decision, has the quality of relevance. True False

23. Information about a customer's credit history that is received after the decision to grant additional credit lacks completeness. True False

24. The consistency principle is violated when a firm uses straight-line depreciation one year and changes to declining balance depreciation the next year. True False

25. Accuracy is the correspondence or agreement between the information and the actual events or objects that the information represents. True False

26. To be reliable information must be relevant. True False


27. The most important information for tactical management involves information about the organization's environment. True False

28. Deciding how much credit to grant to a customer is a structured decision. True False

29. Strategic management requires more detailed information than operations management. True False

30. The three steps in decision making take place in the sequence of (1) intelligence (2) design (3) choice. True False

31. Strategic managers use more information from outside the organization than do operations managers. True False

32. Operations management requires information that is more accurate and timely than strategic management. True False

33. What controls will be necessary is a question that an accountant answers in the design of the AIS. True False

34. As a designer of an AIS the accountant will test a new system's controls. True False

35. As a user of an AIS an accountant must know how systems are developed. True False


36. The three themes of the text book include all of the following except: A. enterprise systems B. risk assessment C. e-business D. internal control

37. Efficiency and effectiveness of operations are goals of: A. enterprise systems B. risk assessment C. e-business D. internal control

38. A set of interdependent elements that together accomplish specific objectives is a A. system B. subsystem C. database D. accounting information system

39. A system can be further divided into A. input data B. subsystems C. databases D. enterprise systems

40. A system that consists of an integrated set of computer-based and manual components established to collect, store, and manage data and to provide output information to users is a(n) A. output B. ERP C. database D. information system

41. An information system: A. is composed of only the computer-based information resources of an organization B. may consist of both computer-based and manual components C. is different from a data processing system because it uses computers D. is not generally used for transaction processing


42. The AICPA has identified all but which of the following as assurance services? A. risk assessment B. information systems reliability C. electronic commerce D. consulting

43. The sequence of components in the functional model of an information system is A. Output, Input, Processing, Users B. Input, Processing, Output, Users C. Processing, Input, Users, Output D. Users, Processing, Input, Output

44. Historically, the relationship between an information system and an accounting information system has been: A. the AIS is a part of the IS B. the IS is a part of the AIS C. the IS and the AIS are one in the same D. the IS and AIS are unrelated

45. The text takes the following view of the relationship between an IS and an AIS: A. the AIS is part of the IS B. the IS is part of the AIS C. the IS and the AIS are one in the same D. the AIS is the primary system and the IS the subsystem

46. A man-made system that generally consists of an integrated set of computer-based components and manual components established to collect, store, and manage data and to provide output information to users. A. information system B. output system C. business event system D. database system

47. The suggests that technology improves information available for decision making A. AICPA B. Sarbanes-Oxley Act of 2002 C. Occupational Outlook Handbook D. Accounting Information System


48. A man-made system consisting of people, equipment, organization, policies and procedures with the objective of accomplishing the work of the organization. A. operations process B. management process C. information process D. planning process

49. A man-made system consisting of people, authority, organization, policies and procedures whose objective is to accomplish the work of planning and controlling the operations of the organization. A. operations process B. management process C. information process D. planning process

50. The three logical components of a business process include all of the following except: A. management process B. operations process C. information process D. organization process

51. Which of the following statements is true? A. The information process facilitates operations by maintaining data such as inventory and customer data. B. The information process provides the means by which management monitors the operations process. C. Management designs the operations and information processes. D. All of the statements are true.

52. Which of the following statements is false? A. Management designs the operations and information processes and establishes these processes with people, equipment, and policies. B. Information process users include operations personnel, management, and people outside the organization. C. Operations related and accounting related processes are designed by those external to the organization. D. None of the statements are true.

53. is (are) data presented in a form that is useful to decision makers. A. activities B. information C. objectives D. goals


54. are facts and figures in raw form. A. data B. information C. objectives D. goals

55. All of the following are components of relevance except: A. feedback value B. predictive value C. verifiability D. timeliness

56. All of the following are components of reliability except: A. validity B. accuracy C. verifiability D. feedback value

57. The Sarbanes-Oxley Act of 2002 dramatically changed the daily work of financial accountants and auditors because it A. expanded the scope of the audit beyond financial information B. required that organizations work with their auditors to design systems of internal control C. required that external auditors report on the effectiveness of an organizations system of internal control D. expanded the opportunities for auditors to engage in consulting activities with their audit clients

58. Internal control is a process designed to provide absolute assurance regarding achieving objectives in which of the following? A. efficiency and effectiveness of operations B. reliability of reporting C. compliance with applicable laws and regulations D. none of the above

59. improves the decision maker's capacity to predict, confirm, or correct earlier expectations A. understandability B. predictive value and feedback value C. neutrality D. comparability


60. The information quality that enables users to identify similarities and differences in two pieces of information is A. understandability B. predictive value and feedback value C. neutrality D. comparability

61. The correspondence or agreement between the information and the actual events or objects that the information represents is known as A. accuracy B. completeness C. neutrality D. comparability

62. The degree to which information includes data about every relevant object or event necessary to make a decision is A. accuracy B. completeness C. neutrality D. comparability

63. The ability of more than one individual to come to the same measurement is known as A. accuracy B. completeness C. verifiability D. comparability

64. A primary reason that the FASB requires that GAAP be consistently applied from one period to the next is A. accuracy B. completeness C. neutrality D. comparability

65. If information arrives too late to impact a decision then there is a problem with A. timeliness B. relevance C. completeness D. neutrality


66. Which of the following is NOT one of the three steps in decision making as described in the text A. action B. intelligence C. design D. choice

67. Regarding management problem structure and information requirements, which of the following represents the vertical information flows from lowest to highest? A. strategic management, tactical management, operations management, operations and business event processing B. operations and business event processing, strategic management, tactical management, operations management C. tactical management, operations management, strategic management, operations and business event processing D. operations and business event processing, operations management, tactical management, strategic management

68. Which of the following statements is true? A. With a more structured decision, there is a need for less accurate information. B. With a more structured decision, there is a need for summarized data. C. With a more structured decision, there is a need for well defined, more accurate data. D. With a less structured decision, there is a need for well defined more accurate data.

69. Which of the following is an unstructured decision? A. how much inventory to reorder B. how fast an assembly line should operate C. when scheduled maintenance should be performed D. which research and development projects should be undertaken

70. At which level of the organization are decisions most unstructured? A. operations and business event processing level B. strategic management level C. operations management level D. tactical management level


71. requires information to assess the environment and to project future events and conditions. A. strategic management B. tactical management C. operations management D. operations and business event processing

72. requires information that focuses on the day to day management of the business. A. strategic management B. tactical management C. operations management D. operations and business event processing

73. The central repository for all the data related to the enterprise's business activities and resources. A. information system B. management information system C. enterprise database D. strategic planning

74. E-business does not include A. business processes between individuals and organizations B. electronic networks C. ERP systems D. interaction between back-office and front-office processes

75. Enterprise systems A. integrate back-office and front-office processes B. can include ERP systems C. have become fairly easy to implement D. facilitate business processes between organizations

76. Which of the following statements is false? A. Strategic planning is relatively unstructured. B. Strategic planning uses much information from outside the firm. C. Tactical management focuses on relevant operations units and uses some external information. D. Tactical management uses the most detailed and accurate information.


77. Generally, which of the following is NOT one of the three roles an accountant typically fills in relation to the AIS? A. designer B. programmer C. user D. auditor

78. Which of the following questions might the accountant answer in the design of the AIS? A. what will be recorded B. what controls are necessary C. what reports will be produced D. all of the above

79. Which of the following is an element of the operations process? A. production B. planning C. controlling D. decision making

80. Which of the following is one of the three most prominent management activities? A. production B. finance C. marketing D. planning

81. Accounting is an activity of the A. management process B. operations process C. information process D. organization process

82. Decision-making is an activity of the A. management process B. operations process C. information process D. organization process


83.

, are the three themes of the textbook.

, and

84. The auditors, and others.

Act of 2002 changed the daily work of financial accountants,

85. A(n) specific objectives.

is a set of independent elements that together accomplish

86. The component parts of any system are known as

.

87. Software packages that can be used for the core systems necessary to support enterprise systems are called .

88. is the application of electronic networks (including the Internet) to undertake business processes between individuals and organizations.

89. is a process¾effected by an entity's board of directors, management, and other personnel¾designed to provide reasonable assurance regarding achieving objectives in the following categories: efficiency and effectiveness of operations, reliability of reporting, and compliance with applicable laws and regulations.

90. The units of the Big Four public accounting firms have accounted for a significant percentage of the firm's business and, prior to the Sarbanes-Oxley Act of 2002, were growing faster than the accounting, auditing, and tax portions of their businesses.


91. To provide non-audit services the accountant will be required to have core competencies that include "interpretation of converging information" (able to interpret and provide a broader context using financial and nonfinancial information) and ''technology adept'' (able to use and leverage technology in ways that add value to clients, customers, and employers).

92. Three of the five proposed core services of the are assurance and information integrity, management consulting and performance measurement, and technology services.

93. Historically, the accountant has performed a(n) the reliability of financial information presented in printed financial statements.

function to determine

94. A(n) system generally consists of both computerized and manual components that operate to collect, store, and manage data and to provide output information to users.

95. The is a man-made system consisting of the people, equipment, organization, policies, and procedures whose objective is to accomplish the work of the organization.

96. To present the results of their endeavors effectively, accountants must possess strong .

97. decisions are those for which all three decision phases (intelligence, design, and choice) are relatively routine or repetitive.

98. A(n) financial transactions.

is designed to collect, process, and report information related to


99. Input, processing, information system.

, and users are included in a functional model of an

100. The highest level of management activity and the one with the broadest scope is management.

101. In the management hierarchy, the level that lies between strategic management and operations management is called management.

102. Facts or figures in raw form are referred to as

.

103. The quality of information concerns the provision of information through the optimal (most productive and economical) use of resources.

104. The quality of information deals with information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent, and usable manner.

105. Information that is capable of making a difference in a decision of a user is said to possess the quality of .

106. Information that is available before it loses its capacity to influence a user's decision possesses the quality of .


107. Information that improves a decision makers ability to predict, confirm, or correct earlier expectations has the quality known as .

108. The quality of information when there is a high degree of consensus about the information among independent measurers using the same measurement methods is referred to as .

109. Information that is not biased is said to possess

.

110. The quality of information that enables users to identify similarities and differences in two pieces of information is referred to as .

111. GAAP is applied related information from one period to the next.

when we can compare financial statements and

112. Section of the Sarbanes-Oxley Act of 2002 requires auditors to report on about the effectiveness of the organizations' systems of internal control.

113. Section of the Sarbanes-Oxley Act of 2002 requires management to identify, document and evaluate significant internal controls.

114. Section of the Sarbanes-Oxley Act of 2002 requires disclosure to the public on a rapid and current basis of material changes in an organization's financial condition.


115. The is a man-made system consisting of the people, authority, organization, policies, and procedures whose objective is to plan and control the operations of the organization

116. activity.

is data presented in a form that is useful in a decision-making

117. Information about actual authorized events and objects has

.

118. is the correspondence or agreement between the information and the actual events or objects that the information represents.

119. is the degree to which information includes data about every relevant object or event necessary to make a decision and includes that information only once.

120. Describe the activities performed and information used by each of the following levels in the management structure: a. b. c.

Strategic management Tactical management Operations management


121. Describe the three roles that an accountant can play in the AIS?

122. Discuss five of the ten items that comprise the components of the study of AIS in this text.


Chapter 1--Introduction to Accounting Information Systems Key

1. FALSE 2. FALSE 3. TRUE 4. FALSE 5. TRUE 6. TRUE 7. TRUE 8. FALSE 9. TRUE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. TRUE 15. FALSE 16. TRUE 17. FALSE 18. FALSE 19. TRUE 20. TRUE 21. FALSE 22. TRUE 23. FALSE 24. TRUE 25. TRUE 26. FALSE 27. FALSE 28. TRUE 29. FALSE


30. TRUE 31. TRUE 32. TRUE 33. TRUE 34. FALSE 35. FALSE 36. B 37. D 38. A 39. B 40. D 41. B 42. D 43. B 44. A 45. C 46. A 47. C 48. A 49. B 50. D 51. D 52. C 53. B 54. A 55. C 56. D 57. C 58. D 59. B 60. D 61. A 62. B 63. C


64. D 65. A 66. A 67. D 68. C 69. D 70. B 71. A 72. C 73. C 74. C 75. B 76. D 77. B 78. D 79. A 80. D 81. B 82. A 83. Enterprise systems, e-business, internal control or Enterprise systems, internal control, e-business or internal control, Enterprise systems, e-business or internal control, e-business, Enterprise systems or e-bu 84. Sarbanes-Oxley 85. system 86. subsystems 87. enterprise resource planning (ERP) systems or enterprise resource planning systems or ERP systems 88. E-business 89. Internal control 90. business consulting 91. assurance 92. CPA Vision Project 93. attest 94. information or management information 95. operations process 96. oral and written communication skills 97. Structured


98. accounting information system (AIS) or accounting information system or AIS 99. output 100. strategic 101. tactical 102. data 103. Efficiency 104. Effectiveness 105. relevance 106. timeliness 107. feedback value or predictive value 108. verifiability 109. neutrality or freedom from bias 110. comparability 111. consistently 112. 404 113. 404 114. 409 115. management process 116. information 117. validity 118. accuracy 119. completeness 120. Suggested answer: a. Strategic management requires information to assess the environment and to project future events and conditions. Such information is even more summarized, broader in scope, and comes from outside the organization more than does the information used by tactical management. To be useful to division managers, chief financial officers (CFOs), and chief executive officers (CEOs), information must relate to longer time periods, be sufficiently broad in scope, and be summarized to provide a means for judging the long-term effectiveness of management policies. External financial statements, annual sales reports, and division income statements are but a few examples of strategic-level information. b.

Tactical management requires information that focuses on relevant operational units and is more summarized, broader in scope, and need not be as accurate as the information used by operations management. Some external information may be required. For example, a warehousing and distribution manager might want information about the timeliness of shipments each month.

c.

Information useful to operations management personnel is often an aggregate of data related to several business events. For example, a report summarizing shipments made each day might be useful to the shipping manager. At the operations management level, supervisors use this type of information to monitor the daily functioning of their operating units. The vertical information useful to operations management is a summarized and tailored version of the information that flows horizontally.


121. The three roles the accountant can play in the AIS are designer, user and auditor. The accountant is a designer of the AIS who brings knowledge of accounting principles, auditing principles, information systems techniques, and systems development methods. The accountant is also a user of the AIS and will provide feedback on how well the system works, how easy or difficult it is to use, and on what items can be changed or improved from a user perspective. The accountant performs a number of functions within the organization such as controller, treasurer, financial analyst, all of which are users of the AIS. Accountants, as users of the system can also be effective in the design process because of the functions they perform. As internal and external auditors, accountants audit the AIS or provide assurance services about internal control or other items discussed in the chapter. Auditors are interested in the reliability of accounting data and of the reports produced by the system. They may test the system's controls, assess the system's efficiency and effectiveness, and participate in the system design process. The auditor must possess knowledge of internal controls, systems development techniques, technology and the design and operation of the AIS to be effective. 122. The 10 components of the study of AIS are depicted in Figure 1.1. A detailed description of these components may be found in the chapter. Here is a brief summary of the detailed descriptions: · Technology. Technological developments have a profound effect on information systems; enterprise systems, ERP systems, e-business, databases, and intelligent systems are but a few examples. Technology provides the foundation on which AIS and business operations rest, and knowledge of technology is critically important to your understanding of the AIS discipline. · Databases. To perform analysis, to prepare information for management decision making, and to audit a firm's financial records, an accountant must be able to access and use data from public and private databases. · Reporting. To design reports generated by an information system, the accountant must know what outputs are required or are desirable. These reports often support management decisions as well as fulfill certain reporting obligations. GAAP-based financial statements are but one example of reporting that will be considered in our study of AIS. · Control. Traditionally, accountants have been experts on controlling business processes. As a practicing accountant, you will probably spend much of your time providing such expertise. You must develop an understanding of control that is specific to the situation at hand, yet is adaptable for the future. · Business operations. Organizations engage in activities or operations, such as hiring employees, purchasing inventory, and collecting cash from customers. AIS operates in concert with these business operations. Many AIS inputs are prepared by operating departments¾the action or work centers of the organization¾and many AIS outputs are used to manage these operations. Therefore, we must analyze and manage an AIS in light of the work being performed by the organization. · Events processing. As organizations undertake their business operations, events, such as sales and purchases, occur. Data about these events must be captured and recorded to mirror and monitor the business operations. The events have operational and AIS aspects (i.e., some do not have a direct accounting impact, and some are accounting "transactions" that result in entries in the general ledger). To design and use the AIS, an accountant must know what event data are processed and how they are processed. · Management decision making. The information used for a decision must be tailored to the type of decision under consideration. Furthermore, the information is more useful if it recognizes the personal management styles and preferences of the decision maker. · Systems development and operation. The information systems that process business events and provide information for management decision making must be designed, implemented, and effectively operated. An accountant often participates in systems development projects as a user or business process owner contributing requests for certain functions or an auditor advancing controls for the new system. Choosing the data for a report, designing that report, and configuring an enterprise system are examples of systems development tasks that can be accomplished by an accountant. · Communications. To present the results of their endeavors effectively, accountants must possess strong oral and written communication skills. Throughout this course, you will be required to evaluate alternatives, to choose a solution, and to defend your choice. Technical knowledge alone won't be enough for the last task. · Accounting and auditing principles. To design and operate the accounting system, an accountant must know the proper accounting procedures and must understand the audits to which the accounting information will be subjected.


Chapter 2--Enterprise Systems Student: 1. One of the primary goals of implementing an ERP system is to standardize systems across multiple locations and multiple divisions. True False

2. Large multilocation and multidivision companies are challenged to see the greatest benefits from ERP systems. True False

3. Early adopters of ERP systems were in the business of making products. True False

4. ERP systems have proved to be quite easy to install and in short periods of time. True False

5. Enterprise systems potentially integrate the business process functionality and information from all of an organization's functional areas. True False

6. With an enterprise system an organization will conduct business in a more costly manner. True False

7. An add-on software module in an enterprise system might be a customer relationship management system (CRM). True False

8. The dominant player in the large system ERP arena is Microsoft. True False


9. SAP has a primary focus on large Fortune 500 type companies. True False

10. Microsoft Dynamics and Sage Group focus on small and mid market sized companies. True False

11. Customer relationship management (CRM) software builds and maintains an organization's customer-related database. True False

12. Customer relationship management (CRM) software aggregates, manages, and retains data across the entire organization for the identification, acquisition, and retention of vendors to maximize the benefits of those relationships. True False

13. If you have made a Web purchase such as with Amazon.com you have experienced some of the functionality of a CRM system where the vendor keeps track of your name, address, and purchases. True False

14. Customer relationship management (CRM) functionality includes procurement and contract management. True False

15. Customer self service (CSS) software is often an extension of CRM software. True False

16. Supply chain management (SCM) software helps plan and execute steps such as demand planning, acquiring inventory, manufacturing, distributing, and selling the product. True False

17. Supplier relationship management (SRM) software manages the interactions with the organization's that supply the goods and services to an enterprise. True False


18. Middleware is a software product that connects two or more separate applications or software modules. True False

19. Enterpriseware might be used to stitch together a number of legacy systems, an enterprise system, best-of-breed applications, and Web-based applications. True False

20. An Application Programming Interface (API) is a means for connecting to a system or application provided by the developer of that application. True False

21. Microsoft Dynamics Snap line of tools is an example of an Application Programming Interface. True False

22. Enterprise application integration (EAI) links together two or more systems and allows them to work together. True False

23. Product life-cycle management (PLM) software manages product data from design through manufacture, and disposal. True False

24. Enterprise Services Bus (ESB) is a type of communications-broker software that uses standardized protocols to let event-driven applications communicate in a less-expensive manner than can the tightly-coupled, synchronous enterprise application integration (EAI) platforms. True False

25. DreamWeaver is a Web services platform from SAP that can be used to build applications that integrate business processes and databases from a number of sources within and between organizations. True False


26. Business process management (BPM) provides a comprehensive method for integrating manual and automated internal processes, applications, and systems, as well as integration to external partners and services. True False

27. With a best-of-breed approach an organization can minimize the number of different software modules employed to implement an enterprise system. True False

28. Event driven-architecture (EDA) is an approach to designing and building enterprise systems in which business events trigger messages to be sent by middleware between independent software modules that are completely unaware of each other. True False

29. In event driven architecture (EDA) the business unit "pushes" the event to the recipient rather than waiting for the recipient to request or "pull", the event. True False

30. The value chain is a chain of activities performed by the organization to transform outputs into inputs valued by the customer. True False

31. An organization creates a competitive advantage by creating less value for its customers than does its competition. True False

32. Supporting activities of the value chain include activities directly involved with marketing, producing, selling, and delivering the product or service to the customer. True False

33. Primary activities of the value chain provide infrastructure such as procurement, information technology, human resources, and accounting. True False


34. The value chain works to separate the functional activities or silos of the organization. True False

35. Dell's value chain takes raw materials, manufactures computers and other products, and delivers them to customers in a timely manner at an attractive price. True False

36. The activities in the value chain, the value activities, are business processes that convert inputs to valued outputs. True False

37. In a disaggregated information system, the customer will be notified immediately whether the item is on the shelf and not committed to another customer. True False

38. Telling the customer when they will receive an item is known as available to promise (ATP). True False

39. A character is a basic unit of data such as a letter, number, or special character. True False

40. A field is a collection of related characters that comprise an attribute, such as a customer number or name. True False

41. A record is a collection of related data fields pertaining to a particular entity or event. True False

42. The credit limit within a customer record always provides unlimited authorization to accept a customer order. True False


43. Segregation of duties includes separating the sales and credit departments. True False

44. Generally, when processing a customer order, one does not need to know the total price of the goods before credit authorization can be made. True False

45. In an enterprise system, once a customer order is completed, the purchasing function can be immediately informed that the merchandise has been sold and may need to be replenished. True False

46. It is best to combine authorization of data-maintenance activities with authorization of business event processing activities. True False

47. An enterprise systems centralized database can make data, such as inventory data, visible throughout the organization. True False

48. The correct sequence of the three steps in the sales and distribution process are (1) order entry (2) shipment process and (3) billing process. True False

49. The correct sequence of the three steps in the materials management process is (1) record vendor invoice (2) create purchase order (3) receive the goods. True False

50. The bottom line is that without integrated information systems organizations have difficulty being managed on a day-to-day basis and being successful in the long run. True False


51. The financial accounting module integrates with the sales and distribution and materials management modules. True False

52. The purchase-to-pay process includes the events surrounding the sale of goods to a customer, the recognition of revenue, and the collection of the customer payment. True False

53. The order-to-cash process includes events surrounding the purchase of goods from a vendor, the recognition of those costs, and the payment to the vendor. True False

54. With the installation of an enterprise system an organization should experience all of the following except A. improved customer service B. empowerment of decentralized operations C. improved budgeting D. reduced personnel

55. Core applications of an ERP are A. financial accounting B. materials management C. sales and distribution D. all of the above

56. Which of the following is usually not part of an ERP's core applications? A. legacy systems B. financial accounting C. material management D. sales and distribution

57. The enterprise system might facilitate the purchase of office equipment by all of the following except A. providing an electronic order form (a purchase requisition) B. assisting the vendor with the selection of the appropriate purchase order C. routing the order to appropriate authorities for specific approval D. making data available for management analysis


58. The most dominant player in the ERP market for large companies is A. Oracle B. Sage C. SAP D. Microsoft

59. Which statement about ERP installation is least accurate? A. For the ERP to be successful, process reengineering is normally required. B. A problem with ERPs is that some important business processes may not be supported. C. When a business is diversified, little is gained from ERP installation. D. Only required modules need be installed.

60. Which statement is true? A. ERPs are infinitely scalable. B. Performance problems usually stem from technical problems, not business process reengineering. C. The better ERP can handle any problems an organization can have. D. ERP systems can be modified using add-on software.

61. Software that builds and maintains an organization's customer-related database is known as A. customer relationship management (CRM) software B. customer self service (CSS) software C. sales force automation (SFA) software D. supply chain management (SCM) software

62. Software that allows an organization's customers to complete inquiry without the aid of the organization's employees is known as A. customer relationship management (CRM) software B. customer self service (CSS) software C. sales force automation (SFA) software D. supply chain management (SCM) software

63. Software that automates sales tasks such as order processing and tracking is known as A. customer relationship management (CRM) software B. customer self service (CSS) software C. sales force automation (SFA) software D. supply chain management (SCM) software


64. Software that helps execute steps such as demand planning, acquiring inventory, manufacturing, distribution, and sales is known as A. customer relationship management (CRM) software B. customer self service (CSS) software C. supplier relationship management (SRM) software D. supply chain management (SCM) software

65. Software that manages the interactions with the organization's that supply the goods and services to an enterprise is known as A. customer relationship management (CRM) software B. customer self service (CSS) software C. supplier relationship management (SRM) software D. supply chain management (SCM) software

66. Software that manages the product, beginning with the design of the product, continuing through manufacture and culminating in the disposal of the product, is known as A. product lifecycle management (PLM) software B. product relationship management (PRM) software C. product self service (PSS) software D. supplier relationship management (SRM) software

67. Supply chain management (SCM) software A. is typically under the control of external partners in the chain. B. helps plan and execute demand planning; acquiring inventory; and manufacturing, distributing, and selling a product. C. cannot be integrated into an overall ERP. D. none of the above

68. Some third-party modules can extract data from A. legacy systems only B. ERP systems only C. both legacy systems and ERP systems D. all of the above


69. Which of the following tracks a product from design, continuing through manufacture, and culminating with the disposal of the product at the end of its life? A. supply chain management (SCM) B. value chain C. product life cycle management (PLM) D. none of the above

70. Technology that can connect together ERP systems and third party add-on modules is called A. supply chain software B. enterprise application integration (EAI) C. EDP systems D. none of the above

71. Enterprise systems support an organization by: A. facilitating the functioning of an organization's operations B. retaining records about business events C. storing data useful for decision making D. all of the above

72. In an event-driven architecture (EDA) A. business events are handled as batches of events B. a business unit "pulls" the event to the recipient C. business events are "pushed" immediately and simultaneously to all interested parties D. none of the above

73. In an event-driven architecture (EDA) A. business events are processed in batches B. the enterprise operates in real time C. the enterprise only uses modules from a single software vendor D. none of the above

74. In an event-driven architecture (EDA) A. each business event is handled individually B. real time processing reduces delays in business processing C. an event notification is sent to the middleware, also known as "publish" or "send" D. all of the above


75. The general term for software that connects third-party modules to ERP systems is known as A. DreamWeaver B. Middleware C. Microsoft D. NetWeaver

76. An approach to designing and building enterprise systems in which business events trigger messages to be sent by middleware between independent software modules that are completely unaware of each other. A. Application Programming Interface (API) B. Business Process Management (BPM) C. Enterprise Resource Planning (ERP) D. Event-driven architecture (EDA)

77. This provides a comprehensive method for integrating manual and automated internal processes, applications, and systems, as well as integration to external partners and services. A. Application Programming Interface (API) B. Business Process Management (BPM) C. Enterprise Resource Planning (ERP) D. Event-driven architecture (EDA)

78. Primary activities of the value chain include A. Accounting B. human resources C. Procurement D. Production

79. Supporting activities of the value chain include A. Accounting B. Marketing C. Production D. Sales

80. Information technology (IT) has been able to create additional value by A. reducing costs B. improving quality C. balancing the cost and timeliness of value activities D. all of the above


81. Which of the following statements is false? A. Value chain activities need to be closely coordinated. B. Primary value chain activities include marketing and sales. C. An organization's value chain is the only component of the value system. D. None of the statements are false.

82. The correct sequence of elements leading to an "available to promise" (ATP) is A. item is not committed to another customer, item is on shelf, determine pricing, check customer credit limit B. item is on shelf, determine pricing, item is not committed to another customer, check customer credit limit C. item is on shelf, item is not committed to another customer, check customer credit limit, determine pricing D. item is on shelf, item is not committed to another customer, determine pricing, check customer credit limit

83. The four Ws of capturing data do not include A. Who B. What C. Why D. When

84. A basic unit of data such as a letter, number, or special character is known as a A. Character B. Field C. Record D. none of the above

85. A collection of related characters that comprise an attribute such as a customer number or name is known as a A. Character B. Field C. Record D. none of the above

86. A collection of related data fields pertaining to a particular entity or event is known as a A. Character B. Field C. Record D. none of the above


87. The correct sequence of events for entering a customer order is A. edit order, record sales order, update inventory, notify warehouse B. record sales order, edit order, update inventory, notify warehouse C. notify warehouse, edit order, record sales order, update inventory D. edit order, notify warehouse, record sales order, update inventory

88. Steps in the sales and distribution process include all of the following except A. order entry B. shipment C. receiving D. billing

89. Steps in the materials management process include all of the following except A. creating the purchase order B. shipment C. receiving D. recording the vendor invoice

90. The module plays a central role in the SAP system by collecting business events from other modules. A. human resources B. controlling and profitability analysis C. financial accounting D. customer relationship management

91. The module of the SAP system handles internal accounting including cost center accounting, activity-based accounting, and budgeting. A. human resources B. controlling and profitability analysis C. financial accounting D. customer relationship management

92. The module of the SAP system handles payroll processing. A. human resources B. controlling and profitability analysis C. financial accounting D. customer relationship management


93. Which of the following is included in the first step in the order-to-cash process? A. sales order processing B. responding to customer inquiries C. pick and pack D. billing

94. What is the correct sequence of the order-to-cash process? A. sales order processing; pick and pack; shipping; billing; payment; responding to customer inquiries B. sales order processing; responding to customer inquiries; pick and pack; shipping; billing; payment C. sales order processing; pick and pack; billing; shipping; payment; responding to customer inquiries D. responding to customer inquiries; sales order processing; pick and pack; shipping; billing; payment

95. What is the first step in the purchase-to-pay process? A. purchase order processing B. pick and pack C. requirements determination D. goods receipt

96. What is the correct sequence of the purchase-to-pay process? A. purchase order processing; goods receipt; invoice verification; payment processing; requirements determination B. requirements determination; purchase order processing; goods receipt; invoice verification; payment processing C. purchase order processing; requirements determination; goods receipt; invoice verification; payment processing D. purchase order processing; requirements determination; invoice verification goods receipt; payment processing

97. integrate the business process functionality and information from all of an organization's functional areas, such as marketing and sales, cash receipts, purchasing, cash disbursements, human resources, production and logistics, and business reporting (including financial reporting).

98. to support enterprise systems.

are software packages that can be used for the core systems necessary


99. database.

software builds and maintains an organization's customer-related

100. software allows an organization's customers to complete an inquiry, perform a task (including sales), or troubleshoot problems, without the aid of an organization's employees.

101. software automates sales tasks such as order processing, contact management, inventory monitoring, order tracking, and employee performance evaluation.

102. software helps plan and execute the steps in an organization's supply chain including demand planning; acquiring inventory; and manufacturing, distributing, and selling the product.

103. the goods and services to an enterprise.

software manages the interactions with the organizations that supply

104. software manages product data during a product's life, beginning with the design of the product, continuing through manufacture, and culminating in the disposal of the product at the end of its life.

105.

is the dominant player in the ERP market for large businesses.

106. includes integration of business processes, software, standards, and hardware to link two or more systems together allowing them to act as one.


107. The approach combines modules from various vendors to create an information system that better meets an organization's needs than a standard ERP system.

108. A(n) by the developer of that application.

is a means for connecting to a system or application provided

109. usually includes a design environment for modeling and documenting business processes. This is often integrated with the process engine to support iterative design and implementation efforts for maximum process agility

110. is an approach to designing and building enterprise systems in which business events trigger messages to be sent by middleware between independent software modules that are completely unaware of each other.

111. is communications-broker software that uses standardized protocols to let event-driven applications communicate in a less expensive manner than can the tightly coupled, synchronous EAI platforms.

112. Primary activities of the include activities directly involved with marketing, producing, selling, and delivering the product or service to the customer.

113. The of the value chain include functions such as moving raw materials into and around the organization, producing and delivering goods to the customer, and performing services such as installation and after-sales support.

114. The of the value chain are those that provide infrastructure and include functions such as procurement, information technology, human resources and accounting.


115. Telling the customer when the item will be received is known as

.

116. A(n) character.

is a basic unit of data such as a letter, number, or special

117. A(n) such as a customer number or name.

is a collection of related characters that comprise an attribute,

118. A(n) entity or event.

is a collection of related data fields pertaining to a particular

119. The existence of the customer record, including the basic authorization required to accept and record the customer order.

, provides the

120. The process includes the events surrounding the sale of goods to a customer, the recognition of revenue, and the collection of the customer payment.

121. The process includes events surrounding the purchase of goods from a vendor, the recognition of the cost of those goods, and the payment to the vendor

122. system, such as an ERP, is installed.

are older systems that may exist in an organization when a newer


123. Business events are "pushed" immediately and simultaneously to all interested parties in architecture.

124. The four Ws of capturing data are , .

, , and

125. Edit order, record sales order, update inventory, notify warehouse is the sequence of events for entering a(n) .

126. The steps in the process include creating the purchase order, receiving the goods and services, recording the vendor invoice

127. The module that handles internal accounting including cost center accounting, activity based accounting, and budgeting is .

128. The module that handles payroll processing is

129. The first step in the order-to-cash process is

130. The first step in the purchase-to-pay process is

.

.

.


131. include any meaningful change in the state of an enterprise, such as creating a new employee record, submitting a purchase order to a vendor, receiving a payment from a customer, picking goods from a warehouse and delivering them to the shipping department, and revaluing inventory.

132. Third-party modules are connected to the ERP system using software product that connects two or more separate applications or software modules.

,a

133. Define enterprise resource planning (ERP) systems and give some examples of common ERP add-on modules.

134. What are the primary activities of the value chain and what are some of the main functions included in the value chain?

135. List and describe the 6 steps in the order-to-cash process.


136. List and describe the 5 steps in the purchase-to-pay process.

137. Describe 5 of the pros of an enterprise system.

138. Describe 3 of the cons of an enterprise system.

139. Why might a firm decide to implement only certain modules in an ERP system rather than a complete implementation?


140. Why must an organization expect the implementation of an ERP to disrupt operations?

141. Describe and explain these concepts and their relationship to one another: enterprise application integration, middleware, application programming interface, event-driven architecture, enterprise services bus.


Chapter 2--Enterprise Systems Key

1. TRUE 2. FALSE 3. TRUE 4. FALSE 5. TRUE 6. FALSE 7. TRUE 8. FALSE 9. TRUE 10. TRUE 11. TRUE 12. FALSE 13. TRUE 14. FALSE 15. TRUE 16. TRUE 17. TRUE 18. TRUE 19. FALSE 20. TRUE 21. TRUE 22. TRUE 23. TRUE 24. TRUE 25. FALSE 26. TRUE 27. FALSE 28. TRUE 29. TRUE


30. FALSE 31. FALSE 32. FALSE 33. FALSE 34. FALSE 35. TRUE 36. TRUE 37. FALSE 38. TRUE 39. TRUE 40. TRUE 41. TRUE 42. FALSE 43. TRUE 44. FALSE 45. TRUE 46. FALSE 47. TRUE 48. TRUE 49. FALSE 50. TRUE 51. TRUE 52. FALSE 53. FALSE 54. B 55. D 56. A 57. B 58. C 59. C 60. D 61. A 62. B 63. C


64. D 65. C 66. A 67. B 68. D 69. C 70. B 71. D 72. C 73. B 74. D 75. B 76. D 77. B 78. D 79. A 80. D 81. C 82. D 83. C 84. A 85. B 86. C 87. A 88. C 89. B 90. C 91. B 92. A 93. B 94. D 95. C 96. B 97. Enterprise systems


98. Enterprise resource planning (ERP) systems or ERP systems or Enterprise resource planning systems 99. Customer relationship management (CRM) or CRM or Customer relationship management 100. Customer self-service (CSS) or CSS or Customer self-service 101. Sales force automation (SFA) or SFA or Sales force automation 102. Supply chain management (SCM) or SCM or Supply chain management 103. Supplier relationship management (SRM) or SRM or Supplier relationship management 104. Product life-cycle management (PLM) or PLM or Product life-cycle management 105. SAP 106. Enterprise application integration (EAI) or EAI or Enterprise application integration 107. best-of-breed 108. Application Programming Interface (API) or API or Application Programming Interface 109. Business process management (BPM) or BPM or Business process management 110. Event-driven architecture (EDA) or EDA or Event-driven architecture 111. Enterprise Services Bus (ESB) or ESB or Enterprise Services Bus 112. value chain 113. primary activities 114. supporting activities 115. available to promise (ATP) or ATP or available to promise 116. character 117. field 118. record 119. credit limit 120. order-to-cash 121. purchase-to-pay 122. Legacy systems 123. event-driven 124. who, what, where, when 125. customer order or sales order 126. materials management (MM) or MM or material management or purchase-to-pay 127. controlling (CO) and profitability analysis (PA) or controlling (CO) or CO or CO/PA or controlling and profitability analysis 128. human resources (HR) or HR or human resources 129. presale activities or responding to customer inquiries 130. requirements determination 131. Business events


132. middleware 133. Enterprise resource planning (ERP) systems are software packages that can be used for the core systems necessary to support enterprise systems. ERP products are designed to offer integration of virtually all of an organization's major business functions. Examples of common ERP add-on modules include customer relationship management (CRM) software; customer self-service (CSS) software; sales force automation (SFA) software; supply chain management (SCM) software; product lifecycle management (PLM) software; and supplier relationship management (SRM) software. 134. The primary activities of the value chain include those directly involved with marketing, selling, producing and delivering the product or service. This includes functions such as moving raw materials into and around the organization, producing and delivering the products or services to the customer, performing services such as installation and after sales support. 135. 1. 2. 3. 4. 5. 6.

136. 1. 2. 3. 4. 5.

Pre-sales activities including responding to customer inquiries and RFQs. Sales order processing which includes capturing and recording customer orders. Pick and pack which includes picking the goods from the shelf in the warehouse and packing the goods for shipment. Shipping the goods to the customer which includes selecting the appropriate carrier, recording the reduction in inventory, recording cost of goods sold. Billing which includes preparing the customer invoice, recording sales, and recording accounts receivable. Payment which includes recording cash receipts, updating cash and accounts receivable.

Requirements determination which includes preparing the purchase requisition. Purchase order processing which includes preparing and recording purchase orders. In an enterprise system where RFQs are used, it also includes analyzing vendor quotations. Goods receipt which includes comparing the amount ordered to the amount received. Invoice verification which includes receiving the invoice making a three way match of the purchase order, the receipt, and the vendor invoice and recording accounts payable. Payment processing which includes preparing and recording cash disbursements and updating the cash and accounts payable accounts.

137. The answer should include a description of any 5 of the following: Single database Integrated system Process orientation (versus function orientation) Standardization of business processes and data, easier to understand across the organization Faster business processes Timely information Better financial management One face to the customer Reduced inventory Improved cash management Productivity improvement, reduced personnel Full and accurate financial disclosures Improved budgeting, forecasting, and decision support Seamless integration and accessibility of information across the organization Catalyst for reengineering old, inefficient business processes 138. The answer should include a description of any 3 of the following: Centralized control versus decentralized empowerment Inability to support traditional business processes that may be best practices for that organization Loss of flexibility in rapidly adapting to desired new business processes in the post-implementation period Increased complexity of maintaining security, control, and access permissions for specific information embedded in central database The rigidity of "standardization" can impede creative thinking related to ongoing business process improvements 139. The answer should include such items as: Cost considerations Implementing additional modules one at a time or on an as needed basis with additional modules added at a later time There may be legacy systems that they do not want to change The firm may want to add on other modules from a combination of ERP vendors using enterprise application integration 140. Successful implementation of an ERP requires that many business processes be reengineered. Once done, everything is different. If the organizational culture is not responsive to the changes, many problems can arise.


141. Enterprise application integration (EAI) is an approach to connecting together multiple pieces of an enterprise system and/or connecting the enterprise systems of different organizations. Middleware is a software product that connects two or more separate applications or software modules in this approach. An Application Programming Interface (API) is a type of middleware that is a means for connecting to a system or application provided by the developer of that application. In contrast, event-driven architecture is an alternative approach to integration whereby loosely coupled applications react intelligently to changes in conditions and launch several responses rather than waiting to be called into action. Communications-broker software called Enterprise Services Bus (ESB) uses standardized protocols to let event-driven applications communicate in a less-expensive manner than can the tightly-coupled, synchronous EAI platforms.


Chapter 3--Electronic Business (E-Business) Systems Student: 1. E-Business is the application of electronic networks (including the Internet) to exchange information and link business processes among organizations and individuals. True False

2. Standing data is relatively permanent portions of master data. True False

3. Adding, deleting, or replacing standing data is called transaction processing. True False

4. Master data are repositories of relatively permanent data maintained over an extended period of time. True False

5. Data maintenance refers to the recording of business event data and transactions. True False

6. Information processing includes data processing functions related to accounting events, internal operations and financial statement preparation. True False

7. Immediate mode is the data processing mode in which there is delay between data processing steps. True False

8. Processes that include distribution, manufacturing, and accounting operations are front office processes. True False


9. Periodic mode is the data processing mode in which there can be a delay between data processing steps. True False

10. Batch processing is the aggregation of several business events over some period of time with the subsequent processing of these data as a group by the information system. True False

11. A device that is not directly connected to the central computer or network is referred to as an online device. True False

12. In an online transaction entry (OLTE) system, use of data entry devices allows business event data to be entered directly into the information system at the time and place that the business event occurs. True False

13. A computer configuration in which certain equipment is directly connected to the computer is said to be online. True False

14. Online real-time (OLRT) systems gather business event data at the time of occurrence, update the master data essentially instantaneously, and provide the results arising from the business event within a very short amount of time. True False

15. Batch mode is the data processing mode in which there is little or no delay between any two data processing steps. True False

16. Client/server technology is the physical and logical division between user-oriented application programs that are run at the client (user) level and the shared data that must be available through the server (i.e. separate computer containing a database that handles centrally shared activities. True False


17. Value-added networks (VANs) are communication networks that link together several different local user machines with printers, databases, and other shared devices. True False

18. Local area networks (LANs) are communication networks that link up distributed users and local networks into an integrated communication network. True False

19. The Internet is a massive interconnection of computer networks worldwide that enables communication between dissimilar technology platforms. True False

20. Web browsers are software programs designed specifically to allow users to view the various documents and data sources available on the Internet. True False

21. Cloud computing is the use of the Internet to provide scalable services, such as software, and resources, such as data storage, to users. True False

22. SPAM is unsolicited unwanted mail. True False

23. A type of intranet, which has been extended to limited external access, is referred to as an extranet. True False

24. E-mail is the electronic transmission of nonstandardized messages between two individuals who are linked via a communications network. True False

25. Electronic data interchange (EDI) is the capture, storage, management, and control of electronic document images for the purpose of supporting management decision making and facilitating business event processing. True False


26. Electronic document management (EDM) is the computer-to-computer exchange of business data in structured formats that allow direct processing of those electronic documents by the receiving computer system. True False

27. Value-added network (VAN) service acts as the EDI "post office." True False

28. Internet commerce is computer-to-computer exchange of business event data in structured or semi-structured formats via Internet communication that allows the initiation and consummation of business events. True False

29. The benefits of electronic document management (EDM) include improved staff productivity, reduced cost of handling and storing paper and faster processing. True False

30. Applications such as ANSI (X12) and EDIFACT are referred to as transaction software. True False

31. Network providers are companies that provide a link into the Internet by making their directly connected networks available for access by fee-paying customers. True False

32. Internet assurance is a service provided for a fee to vendors in order to provide absolute assurance to users of the vendor's web site that the site is in fact reliable and event data security is reasonable. True False

33. The AICPA Internet assurance program that includes a certification and seal is called VeriSign. True False


34. Electronic store fronts are Internet-located resources for displaying goods and services for sale and for conducting related sales transactions. True False

35. Extranet auction markets provide an Internet base for companies to place products up for bid or for buyers to put proposed purchases up for bid. True False

36. Internet market exchanges enable suppliers to put their products online, by feeding into electronic catalogs that sort through alternatives from different suppliers and electronically place an order. True False

37. Back-office functions include: A. customer interface B. supplier interface C. purchasing D. accounting

38. A by-product of e-business is A. elimination of sales staff B. increase in accounting staff C. production of hard copy reports D. increased errors

39. Purchasing function benefits from e-business include A. elimination of sales staff B. automatic price checking by the computer C. interaction with supplier sales staff D. none of the above

40. The vast majority of e-business volume is A. Business-to-consumer B. Consumer-to-consumer C. Business-to-business D. none of the above


41. By selling tickets over the Internet, airlines have A. enhanced customer service B. directly reached customers C. discontinued paying commissions to travel agents for domestic tickets D. all of the above

42. Suggesting items to Internet customers based on their buying patterns A. is from the collection and analysis of customer purchase data B. is known as "shop at one location" C. has increased sellers' inventory levels D. none of the above

43. Vendor online catalogs can be viewed by customers through a(n): A. browser B. Compiler C. Intranet D. none of the above

44. According to the text, these represent the "book of original entry" A. business event data B. data maintenance C. master data D. standing data

45. These are repositories of relatively permanent data maintained over an extended period of time A. business event data B. data maintenance C. master data D. standing data

46. These are relatively permanent portions of master data A. business event data B. data maintenance C. master data D. standing data


47. This includes functions related to accounting events, internal operations and financial statement preparation A. batch processing B. information processing C. periodic processing D. data maintenance

48. The processing mode in which there is a delay between the various data processing steps is referred to as: A. imperial mode B. periodic mode C. immediate mode D. passive mode

49. In batch processing, business event data are collected and processed A. as soon as possible B. in groups for more timely processing C. in groups D. using OLRT systems

50. A disadvantage of the periodic mode is: A. completeness B. accuracy C. validity D. timeliness

51. The correct sequence of subprocesses for the batch processing of accounting data is A. business event occurs, update master data, record business event data, generate outputs B. business event occurs, generate outputs, update master data, record business event data C. business event occurs, record business event data, update master data, generate outputs D. none of the above

52. A disadvantage of periodic mode systems is A. online master data are only up to date right after the processing has been completed B. it is more expensive to operate than immediate mode systems C. query capability always exists to extract up-to-date data D. data is updated after every transaction


53. In a(n) system, use of data entry devices allows business event data to be entered directly into the information system at the time and place the business event occurs A. online transaction entry (OLTE) B. online transaction data (OLTD) C. Periodic D. electronic document management (EDM)

54. An online transaction entry (OLTE) system merges the traditional subprocesses of: A. business event occurrences and record business event data B. business event occurrences and update master data C. business event occurrences and generate outputs D. record business event data and update master data

55. Systems that gather business event data at the time of occurrence, update the master data essentially instantaneously, and provide the results arising from the business event within a very short amount of time are referred to as: A. online transaction entry (OLTE) B. online real-time (OLRT) C. online transaction data (OLTD) D. electronic document management (EDM)

56. The processing mode in which there is no or little delay between any two data processing steps is referred to as: A. imperial mode B. periodic mode C. immediate mode D. passive mode

57. A system that supports constantly up-to-date reporting of data is A. online transaction entry (OLTE) B. online real-time (OLRT) C. online transaction data (OLTD) D. electronic document management (EDM)

58. Electronic document management (EDM) systems are capable of performing all of the following except: A. capture of data B. storage of data C. control of data D. creation of data


59. There are two categories of electronic document management (EDM) systems: A. document storage and retrieval and business event data processing B. document storage and document retrieval C. periodic storage and immediate retrieval D. immediate storage and periodic retrieval

60. The technology that is the physical and logical division between user-oriented application programs that are run at the client level and the shared data that must be available through a separate computer (server) that handles centrally shared activities is: A. online real-time technology B. client/server technology C. online transaction processing technology D. online transaction entry technology

61. is (are) communication networks that link several different local user machines with printers, databases, and other shared devices. A. Wide area networks (WANs) B. Client/server technology C. Local area networks (LANs) D. The Internet

62. Benefits of electronic data management (EDM) include all of the following except A. reduced cost of handling and storing paper B. improved staff productivity C. faster processing D. less disk storage

63. Which of the following is not a cost of EDI? A. buying or leasing of hardware and software B. training employees C. responsiveness to customers' needs D. reengineering applications

64. Electronic document management (EDM) includes all of the following except: A. capturing document images B. controlling document images C. storing document images D. all of the above are included in EDM


65. The benefits of electronic document management (EDM) include all of the following except: A. improved staff productivity B. reduced computer processing requirements C. reduced cost of handling and storing paper D. faster processing

66. Which of the following is not a benefit of electronic data interchange (EDI)? A. enables continued business with certain business partners B. improved responsiveness to customers' needs C. providing timely and accurate data D. training employees

67. Which of the following is not a cost of electronic data interchange (EDI)? A. entering data only once B. training employees C. buying and leasing hardware and software D. reengineering affected applications

68. Which of the following are the two primary categories of e-business over the web? A. Client and server relationships B. Networks and network providers C. Assurance providers and vendors D. B2B and B2C

69. To implement a secure EDI system between two or more companies, they might use a(n): A. online transaction entry (OLTE) B. value-added network (VAN) C. online transaction data (OLTD) D. online real-time (OLRT)

70. In EDI, the software that includes the purchasing system at the origin and the order entry system at the destination is known as A. translation software B. value-added network (VAN) C. the communications network D. application software


71. The fastest-growing segment of commerce-business is: A. electronic mail (e-mail) B. electronic document management (EDM) C. electronic data interchange (EDI) D. Internet commerce

72. Which of the following is not a benefit of Internet commerce? A. maintaining security of the Internet site B. improved responsiveness to customers' needs C. survival in a competitive industry D. global penetration

73. The risks of Internet commerce include all of the following except: A. redesign of existing business processes B. hackers may attempt to access sensitive information C. individuals or organizations may attempt to overload the system, preventing legitimate customers from accessing the site D. business partners have access to sensitive information

74. WebTrust is a(n): A. e-mail program B. Internet provider C. Internet assurance service D. electronic document management program

75. Which of the following Internet applications would not be categorized as a customer relationship management (CRM) system? A. customer inspects their account. B. customer designs a product. C. customer downloads a software upgrade. D. customer obtains product help.

76. Cloud computing uses the Internet to provide services such as: A. electronic mail (e-mail) B. data storage C. Software D. all of the above


77. Web Services includes the following technologies; A. electronic data interchange (EDI) B. simple object access protocol (SOAP) C. electronic document management (EDM) D. online transaction entry (OLTE)

78. Service-oriented architectures (SOAs) are independent functions (or applications) that can be distributed over a network via: A. Web services B. value-added networks (VANs) C. local area networks (LANs) D. wide area networks (WANs)

79. Internet market exchanges: A. restrict those that can participate B. eliminate the need for credit and background checks C. bring together buyers and sellers in the same industry D. are approved by the Federal Trade Commission (FTC)

80. The proper sequence of activities in a manual accounting system is: A. journalize, summarize, post B. journalize, post, summarize C. post, journalize, summarize D. post, summarize, journalize

81. The application of electronic networks (including the Internet) to exchange information and link business processes among organizations and individuals is referred to as .

82. Processes that include distribution, manufacturing, and accounting are processes.

83. A(n)

is a book of original entry for recording business events.


84. extended period of time.

are repositories of relatively permanent data maintained over an

85. standing data portions of master data.

includes activities related to adding, deleting, or replacing the

86. includes data processing functions related to economic events such as accounting events, internal operations and financial statement preparation.

87. customer's credit limit.

include relatively permanent portions of master data, such as a

88. data processing steps.

is the processing mode in which a delay exists between the various

89. is the aggregation of several business events over some period of time with the subsequent processing of these data as a group by the information system.

90. A device that is not directly connected to the central computer or network is referred to as a(n) device.

91. In a(n) system, use of data entry devices allows business event data to be entered directly into the information system at the time and place that the business event occurs.


92. A computer configuration in which certain equipment is directly connected to the computer is said to be .

93. systems gather business event data at the time of occurrence, update the master data essentially instantaneously, and provide the results arising from the event within a very short amount of time.

94. any two data processing steps.

is the data processing mode in which little or no delay occurs between

95. uses the Internet to provide scalable services to users, such as software, and resources, such as data storage.

96. Systems that capture, store, manage, and control electronic document images are called .

97. is the physical and logical division between user-oriented application programs that are run at the client (user) level and the shared data that must be available through a server (separate computer) that handles centrally shared activities.

98. are communication networks that link several different local user machines with printers, databases, and other shared devices.

99. are communication networks that link distributed users and local networks into an integrated communication network.


100. The is a massive interconnection of computer networks worldwide that enables communication between dissimilar technology platforms.

101. are software programs designed specifically to allow users to easily view the various documents and data sources available on the Internet.

102.

is unsolicited unwanted mail.

103. A mini-internal equivalent to the Internet that links an organization's internal documents and databases into a system that is accessible only to members of the organization, through Web browsers and are increasingly internally developed is a(n) .

104. is the electronic transmission of nonstandardized messages between two individuals who are linked via a communications network.

105. This type of intranet that has been extended to limited external access is a(n) .

106. is the computer-to-computer exchange of business data in structured formats that allow direct processing of those electronic documents by the receiving computer system.

107. A(n)

service acts as the EDI "post office."


108. is computer-to-computer exchange of business event data in structured or semi-structured formats via Internet communication that allows the initiation and consummation of business events.

109. is a software application that supports direct interactions with software objects over an intranet or the Internet.

110. are companies that provide a link into the Internet by making their directly connected networks available for access by fee-paying customers.

111. is a service provided for a fee to vendors in order to provide a limited assurance to users of the vendor's Web site that the site is in fact reliable and event data security is reasonable.

112. The AICPA Internet assurance program that includes a certification and seal is called .

113. provide an Internet base for companies to put products up for bid or for buyers to put proposed purchases up for bid.

114. enable suppliers to put their products online, generally feeding into electronic catalogs that allow the buyer(s) to sort through alternatives from different suppliers and electronically place an order.

115. refer to well-defined, independent functions (or applications) that can be distributed over a network via Web Services.


116. represent the creation of Internet-located resources for displaying goods and services for sale and for conducting related sales events.

117.

processes connect an organization to its customers and suppliers.

118. Compare and contrast manual and automated accounting information systems.

119. Discuss the advantages and disadvantages of the different modes of processing (i.e., OLTE and OLRT).

120. Discuss the alternative methods (E-mail, EDI, and Internet) of conducting electronic commerce.


121. Explain how the Internet and PCs could be used in a college course such as AIS to eliminate all paper exchanged between the students and the professor. What technologies (hardware, software) you would need to carry out your plan. Be as specific as possible.

122. The following is a list of 10 terms and concepts from Chapter 3:

Terms and concepts: A. Master data B. Standing data C. Summarize D. Post to subsidiary ledger E. Post to general ledger

F. G. H. I. J.

Journalize Subsidiary ledger General ledger Information processing Data maintenance

Required: Listed below are ten descriptions of a term or concept. On the blank line to the left of each number, insert the capital letter from the list above of the term or concept that corresponds to the statement. A letter should be used only once. Answers

DESCRI PTIONS 1.

Add an invoice to a customer's account.

2.

Capture a customer invoice.

3.

Customer credit limit.

4.

Income statement and balance sheet accounts.

5.

Change inventory prices.

6.

Increase the balance in the sales account.

7.

Accounting and manufacturing transactions.

8.

Customer invoice.

9.

Accounts receivable master data.

10.

Prepare a trial balance.


Chapter 3--Electronic Business (E-Business) Systems Key

1. TRUE 2. TRUE 3. FALSE 4. TRUE 5. FALSE 6. TRUE 7. FALSE 8. FALSE 9. TRUE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. TRUE 15. FALSE 16. TRUE 17. FALSE 18. FALSE 19. TRUE 20. TRUE 21. TRUE 22. TRUE 23. TRUE 24. TRUE 25. FALSE 26. FALSE 27. TRUE 28. TRUE 29. TRUE


30. FALSE 31. TRUE 32. FALSE 33. FALSE 34. TRUE 35. FALSE 36. TRUE 37. D 38. A 39. B 40. C 41. D 42. A 43. A 44. A 45. C 46. D 47. B 48. B 49. C 50. D 51. C 52. A 53. A 54. A 55. B 56. C 57. B 58. D 59. A 60. B 61. C 62. D 63. C


64. D 65. B 66. D 67. A 68. D 69. B 70. D 71. D 72. A 73. A 74. C 75. B 76. D 77. B 78. A 79. C 80. B 81. electronic business (e-business) or electronic business or e-business 82. back-office or back office 83. business event data store 84. Master data 85. Data maintenance 86. Information processing 87. Standing data 88. Periodic mode 89. Batch processing 90. offline 91. online transaction entry (OLTE) or online transaction entry or OLTE 92. online 93. Online real-time (OLRT) or Online real-time or OLRT 94. Immediate mode 95. Cloud computing 96. electronic document management (EDM) or electronic document management or EDM 97. Client/server technology or Client server technology or Client-server technology


98. Local area networks (LANs) or Local area networks or LANs 99. Wide area networks (WANs) or Wide area networks or WANs 100. Internet 101. Web browsers 102. Spam 103. intranet 104. Electronic mail (e-mail) or Electronic mail or e-mail 105. extranet 106. Electronic data interchange (EDI) or Electronic data interchange or EDI 107. value-added network (VAN) or value-added network or VAN 108. Internet commerce 109. Web services 110. Network providers 111. Internet assurance 112. WebTrust or CPA WebTrust 113. Internet auction markets 114. Internet market exchanges 115. Service-oriented architectures (SOAs) or Service-oriented architectures or SOAs 116. Electronic storefronts 117. Front-office 118. The first activity in the manual accounting system is to journalize the business event (i.e., accounting transaction) in a book of original entry (i.e., a special or general journal). The second activity is to post the business event from the journal to a subsidiary ledger. The third activity is to post the total from the journal to the general ledger. The fourth activity is to summarize the business events by preparing a trial balance. In an automated accounting information system, business event data are stored in a transaction file, which automates the general and special journals of the manual system. Master data, repositories of relatively permanent data maintained over an extended period of time, are updated (analogous to posting to ledgers). Two types of updates can be made to master data: information processing and data maintenance. Information processing includes data processing functions related to economic events such as accounting events, internal operations such as manufacturing, and financial statement preparation such as adjusting entries. Data maintenance includes activities related to adding, deleting, or replacing the standing data portions of master data. Standing data include relatively permanent portions of master data, such as the credit limit on customer master data and the selling price and warehouse location on inventory master data. The business event data is summarized by retrieving the general ledger master data from storage and printing (or preparing on screen) the trial balance. A computerized AIS automates the manual accounting process with which you are already quite familiar and will often do so in such a way as to make the automated process roughly equivalent to the manual process. That is, when we computerize an AIS, we may merely change how the data are processed; we often won't change what tasks are performed.


119. Advantages OLTE Data entered directly into the information system at the time and place the transaction occurs. Eliminates the need to have one person enter business event data on a source document and then have a second person perform the data entry. Use of bar code readers and scanners aid in accuracy of inputs Can be used with the periodic mode of transaction processing. Disadvantages OLTE May require using expensive software and hardware. Master files may be out-of-date except after updating.

OLRT Data entered directly into the information system at the time and place the transaction occurs. Transactions are processed individually and master files are updated instantaneously. Allows reports and queries to be executed at any time from up-to-date data.

OLRT Requires expensive software, hardware, and communication systems. Transactions cannot be aggregated on a local computer to be transferred later to a data processing center.

120. E-mail is the electronic transmission of nonstandardized messages between two individuals who are linked via a communications network. Businesses can use e-mail to target market potential buyers. This method of contacting customers is less expensive and more efficient than U.S. mail. However, the unstructured nature of e-mail makes data capturing more difficult. This can be overcome by including an electronic order form with the e-mail transmission. The use of e-mail may require some transaction keying by data entry personnel. In addition, the consumer may be hesitant to provide certain information via e-mail, since it is not a secured transmission vehicle. Electronic data interchange (EDI) is the computer-to-computer exchange of business data (i.e., documents) in structured formats that allow direct processing of those electronic documents by the receiving computer system. The benefits of EDI include: business survival, improved responsiveness to customer needs, elimination of reentering data at the receiving organization, reduction of mailroom and other document preparation and handling costs, increased timeliness and accuracy of data, the opportunity to redesign processes and controls. Costs include: modifying trading relationship and renegotiating contracts, buying or leasing hardware and software, establishing relationships with VANs and negotiating contracts, training employees, reengineering affected applications, and implementing security, audit, and control procedures. Control considerations include: ensuring proper authorization, having preventive rather than detective controls, and increased need for program change controls and physical security. Internet commerce is the computer-to-computer exchange of transaction data in structured or semi-structured formats via Internet communication that allows the initiation and consummation of business events. In many cases, the goods or services that are contracted for through the Internet are immediately (or soon after) forwarded back to the consumer via the Internet as well. Benefits of Internet commerce include: business survival, improved responsiveness to customers, global penetration, elimination of reentering data at the receiving organization resulting in increase timeliness and accuracy, reduction of mailroom and other document preparation the opportunity to redesign processes and controls. Costs include: organizational change, buying or leasing equipment and maintaining connection to the Internet, establishing new customers' connections, staffing and training of employees, reengineering application systems, and maintaining security of the Internet site. Risks include hacker attempt to access data, denial-of-service attacks and business partners that have access to sensitive internal data 121. The answers will vary by student but should include items such as: E-mail for electronic communication and for exchange of files such as word processing files, spreadsheet files, and other files. Course Website Internet based exams and or quizzes Chat rooms and/or Threaded discussions Digital drop box for students to submit files to the instructor Links to other documents Word processing files, files with presentation slides, spreadsheets, or other files should be made available through either the Website, CD, e-mailed, or otherwise made available to the students Server technology so all have access to common materials, database access (with limits for student access) Technologies needed include computers, for communication, hard drives, CD Burner or other disks, Internet access, browser software, word processing software, spreadsheet software, presentation slide software, and other software as needed. 122. Descriptions 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Term or Concept D F B H J E I A G C


Chapter 4--Documenting Information Systems Student: 1. Flowcharts are commonly used for new systems implementations, business process reengineering, finance function transformations, and assessments of internal controls. True False

2. Data flow diagrams (DFDs) depict a system's components; the data flows among the components; and the sources, destinations, and storage of data. True False

3. Data flow diagrams (DFDs) present a comprehensive picture of the management, operations, information systems and process controls embodied in business processes. True False

4. A data flow diagram (DFD) is a graphical representation of a system, which depicts the system's components, data flows and the sources, destinations and storage of data. True False

5. System flowcharts use only four symbols. True False

6. Systems documentation is used to understand, explain, evaluate, and improve complex business processes, information systems, and internal controls. True False


7. In a data flow diagram (DFD), a bubble symbol shown below depicts an entity or a process within which incoming data flows are transformed into outgoing data flows.

True

False

8. The advantage of a physical data flow diagram (DFD) versus a logical data flow diagram (DFD) is that we can concentrate on what activities a system is performing without having to specify how, where or by whom. True False

9. In a data flow diagram (DFD), a square represents an internal entity.

True

False

10. In a data flow diagram (DFD), two parallel lines represent the data store symbol.

True

False

11. The following symbol represents general purpose input-output.

True

False


12. The following symbol represents a computer process.

True

False

13. The following symbol represents a manual process

True

False

14. The following symbol represents a disk data store

True

False

15. The following symbol represents a paper file.

True

False

16. The following symbol represents a document.

True

False


17. In a data flow diagram (DFD), an external entity symbol portrays a source or a destination of data outside the system. True False

18. A context diagram is a top-level diagram of a system that depicts the system and all its activities as a single bubble. True False

19. Internal entities are those entities inside the system that send data to, or receive data from, the system. True False

20. Internal entities are those persons, places, or things that send data to, or receive data from, the system. True False

21. An external entity is a person, place, or thing within the system that transforms data. True False

22. A physical data flow diagram (DFD) uses bubbles to specify where, how, and by whom a system's processes are accomplished. True False

23. When the context diagram and the level 0 diagram have equivalent external data flows, the DFDs are said to be balanced. True False

24. The successive subdivision, or exploding, of logical data flow diagrams (DFDs) is called bottom up partitioning. True False

25. A systems flowchart is a graphical representation of both the physical and logical features of an information system. True False


26. Processes that handle other-than-normal situations are called exception routines. True False

27. Information processing activities retrieve data from storage, transform data, or file data. True False

28. An acceptance stub is a data flow that leaves a bubble but does not go to any other bubble or file and indicates processing that is performed in other than normal situations. True False

29. In an enterprise system, we would have one data store/disk symbol labeled "enterprise database" instead of two or more data store symbols. True False

30. When we convert to an enterprise system, reengineered processes often result from the installation and can cause changes throughout the systems flowcharts. True False

31. Systems flowcharts portray business process activities, stores of data, and flows of data among those elements without presenting the physical details of those elements. True False

32. Data flow diagrams (DFDs) portray a business process' activities, stores of data, and flows of data among those elements. True False

33. In a systems flowchart, a square represents a source or destination of data outside the system.

True

False


34. In a systems flowchart, two parallel lines represent the data store symbol.

True

False

35. Internal entities are included on both data flow diagrams (DFDs) and systems flowcharts. True False

36. Internal entities are included on data flow diagrams (DFDs) but not on systems flowcharts. True False

37. External entities are persons, places, or things outside the context of the system. True False

38. The successive subdividing, or "exploding," of physical data flow diagrams (DFDs) is called top-down partitioning. True False

39. On a systems flowchart the start/stop symbol can also be an external entity. True False

40. There can be only one correct logical data flow diagram (DFD) for any system. True False

41. A symbol used in data flow diagrams (DFDs) to depict an entity or process within which incoming data flows are transformed into outgoing data flows is a(n): A. data flow symbol B. external entity symbol C. bubble symbol D. data store symbol


42. A data flow diagram (DFD) could contain each of the following symbols except: A. a bubble or circle B. an octagon C. a square D. a curved line with an arrow head

43. Which of the following data flow diagram (DFD) symbols is represented by two parallel lines? A. data flow symbol B. external entity symbol C. internal entity symbol D. data store symbol

44. Which data flow diagram (DFD) symbol portrays a source or destination of data outside the system? A. data flow symbol B. external entity symbol C. bubble symbol D. data store symbol

45. Which data flow diagram (DFD) symbol is usually portrayed with a circle? A. data flow B. data store C. external entity D. internal entity or process

46. Which data flow diagram (DFD) symbol is usually portrayed with a square? A. data flow B. data store C. external entity D. process or internal entity

47. Which data flow diagram (DFD) symbol is usually portrayed with an arrow? A. data flow B. data store C. external entity D. process or internal entity


48. In the top-down partitioning of process 3.0, the next level's process bubbles would be labeled (assuming there are four subprocesses): A. 1.3, 2.3, 3.3, 4.3 B. 3.A, 3.B, 3.D, 3.D C. 3.1, 3.2, 3.3, 3.4 D. 3.1.1, 3.1.2, 3.1.3, 3.1.4

49. Which of the following data flow diagram (DFD) guidelines is correct? A. include within the system context any entity that performs one or more information processing activities B. read computer data stores from the process bubble that requires the data C. include within the system context any entity in the system narrative D. data flows should never go from higher- to lower-numbered bubbles

50. Which of the following systems flowcharting guidelines is correct? A. documents or reports printed by a central computer should first be show in that computer's column B. sequential process steps, with no intervening delay, should be shown as one process C. divide the flowchart into columns, one for each internal entity, and label each column D. use a manual process symbol to show the sending or filing of a document

51. Those entities which perform no information processing activities for the system are called: A. external entities B. internal entities C. boundary entities D. environmental entities

52. Which symbol can be either an entity or a process depending on the type of data flow diagram (DFD)? A. bubble symbol B. external entity symbol C. data flow symbol D. data store symbol

53. Which of the following is the least detailed of the data flow diagrams? A. logical data flow diagram B. systems flowchart C. context diagram D. physical data flow diagram


54. In a physical data flow diagram (DFD), this is something within the system that transforms data. A. data flow B. data store C. external entity D. internal entity

55. In a physical data flow diagram (DFD), a bubble or circle could be used to specify each of the following except: A. where a process is performed B. how a process is performed C. by whom a process is performed D. what process is performed

56. Which type of data flow diagram specifies where, how, and by whom a system's processes are performed? A. context diagram B. physical data flow diagram C. logical data flow diagram D. systems flowchart

57. A person, place, or thing within a system that transforms data is called: A. external entity B. data store C. internal entity D. Boundary

58. Which data flow diagram shows what activities the system is performing without having to specify how, where, or by whom the activities are accomplished? A. context diagram B. physical data flow diagram C. systems flowchart D. logical data flow diagram

59. Data flow labels in context diagrams usually describe: A. what the data are (physical labels) B. the nature of the data (logical labels) C. to whom the data are being transmitted (identity labels) D. where the data are being sent (directional labels)


60. In which of the following data flow diagrams does the bubble symbol represent a process and not the entire system? A. context diagram B. physical data flow diagram C. logical data flow diagram D. systems flowchart

61. In a logical data flow diagram (DFD) for a cash receipts system, each of the following labels might appear in a bubble except: A. Cashier B. capture cash receipt C. prepare deposit D. record customer payment

62. The data flows in a logical data flow diagram (DFD) show: A. how the data are transmitted B. where the data are transmitted C. the nature of the data being transmitted D. who transmits the data

63. When two data flow diagrams (DFDs) have equivalent external data flows, we say that the two data flow diagrams are: A. congruent B. similar C. balanced D. equal

64. A process in which successive layers of data flow diagrams (DFDs) are constructed by "exploding" the bubbles on a less detailed DFD to show more detailed data flows is called: A. top-down partitioning B. serial expansion C. balanced construction D. expanded data flows


65. Which of the following statements related to the construction of data flow diagrams (DFDs) is false? A. The level 0 diagram is the next level down from the context diagram. B. If the level 0 diagram has one arrow going into bubble number 1.0 and two arrows leaving bubble number 1.0, then diagram 1.0 will show one arrow entering and two arrows leaving. C. Sources and destinations are depicted by parallel horizontal lines, between which the name of the entity is shown. D. Arrows represent a pathway for data.

66. A systems flowchart varies from a data flow diagram (DFD) because it: A. only represents the information system B. only represents the operations system C. only represents the management system D. represents the management system, the operations system, and the information system

67. Information processing activities include: A. only automated activities B. activities that retrieve, transform, and file data C. the sending of data between entities D. operational activities

68. Why do auditors and systems analysts use systems documentation? A. to understand, explain, and improve complex systems B. only to provide justification to management for systems investments C. to reduce the number and amount of external entities D. to eliminate evidence to be collected

69. On a systems flowchart, computer processing is represented by a: A. Square B. Trapezoid C. Rectangle D. Parallelogram

70. On a systems flowchart, a paper file is represented by a: A. Triangle B. Cylinder C. Rectangle D. Pentagon


71. On a systems flowchart, a solid line with an arrow indicates a(n): A. batch total B. telecommunications link C. off-page connector D. logical flow

72. Which of the following systems flowcharting symbol descriptions is incorrect?

A. Disk B. computer process C. manual process D. Display

73. Which of the following systems flowcharting symbols descriptions is incorrect?

A. Tape B. on-page connector C. start/stop D. paper file


74. Which of the following systems flowcharting symbols descriptions is incorrect?

A. general purpose input-output B. manual process C. multiple-page document D. punched card

75. How many circles (bubbles) are included in a correctly drawn context diagram? A. Zero B. One C. Three D. between 5 and 7 bubbles

76. An information processing activity could be any of the following except: A. sending or receiving data between entities B. document preparation C. data entry D. Verification

77. In drawing a context diagram, we should include: A. only exception routines B. only error routines C. only normal processing routines D. only normal processing and exception routines


78. To make a logical data flow diagram (DFD) readable, how many bubbles should be used? A. one to three B. five to seven C. eight to ten D. as many as needed but no more than ten

79. On a logical data flow diagram (DFD), data flows: A. always go from a higher-numbered to a lower-numbered bubble B. never go from a higher-numbered to a lower-numbered bubble C. can go in either direction as needed D. must go from a bubble to a square

80. All of the following are "guidelines" for grouping activities in a level 0 DFD except: A. group activities if they occur in the same place and at the same time B. group activities if they occur at different times in the same place C. group activities if they occur at the same time but in different places D. group activities that seem to be logically related

81. When a transaction cannot be processed in a routine fashion because of an error or other processing problems, the transaction must be handled by a(n): A. rejection routine B. change report C. exception and summary report D. exception routine

82. The following is a jumbled list of the activities suggested in this text for drafting data flow diagrams (DFDs) for an existing system:

I. II. III. IV. V.

Prepare a table of entities and activities. Prepare an annotated table of entities and activities. Draw a physical data flow diagram. Draw a logical data flow diagram. Draw a context diagram.

The best sequence for undertaking these activities is:

A. I, II, V, III, IV B. I, V, III, II, IV C. II, I, III, V, IV D. II, IV, III, I, V


83. Examine the following context diagram and the related level 0 logical DFD. Which of the following statements is true?

A. The diagrams are prepared correctly. B. A context diagram must have a least two external entities. C. The diagrams are not balanced. D. None of the above are true.

84. Which statement concerning the following diagram 1.0 logical data flow diagram (DFD) is true?

A. The data flow diagram follows DFD guidelines. B. An arrow should never leave a bubble with no destination. C. Data should only flow from a data store. D. Data flow diagrams (DFDs) at this level should show the external entities.


85. Which of the following segments violates guidelines for creating systems flowcharts?

A. Segment a. B. Segment b. C. Segment c. D. Segment d.


86. The following systems flowchart segment depicts a data entry clerk keying data from a source document into a business event data store. Which statement is correct?

A. The systems flowchart was created properly. B. The arrow between the computer process and the data store should be bi-directional. C. The computer process should be shown in the computer column. D. The second symbol in the data entry clerk column should be a square.

87. The following systems flowchart segment depicts a user's query of a data store to view information on a computer screen. Which statement is correct?

A. The systems flowchart was created properly. B. Only a single direction arrow should connect the data store symbol to the process query symbol. C. The query input symbol should be a square. D. The query input symbol should be in the computer column.


88. The following systems flowchart segment depicts a user entering business event data from a source document to update a master file data store. Which statement is correct?

A. The systems flowchart was created properly. B. Only a single disk must be used to represent the master data. C. The every day symbol should be connected with a solid line. D. The master data is a sequential data store.

89. System flowchart logic should: A. flow from left to right B. flow top to bottom C. flow from bottom to top D. a. and b. but minimize crossed lines and connectors

90. Which of these represent a comprehensive picture of management, operations and information systems? A. context diagram B. logical data flow diagram C. physical data flow diagram D. systems flowchart

91. In a data flow diagram (DFD), a(n) symbol depicts an entity or a process within which incoming data flows are transformed into outgoing data flows.


92. In a data flow diagram (DFD), a(n) data.

symbol represents a pathway for

93. In a data flow diagram (DFD) data store symbols are represented by

94. In a data flow diagram (DFD), a(n) destination of data outside the system.

.

symbol portrays a source or a

95. A(n) is the top-level, or least detailed, diagram of a system depicting the system and all its activities as a single bubble and showing the data flows into and out of the system and into and out of the external entities.

96. A(n)

97. to, or receive data from, the system.

is the top-level, or least detailed, diagram of a system.

are those persons, places, or things outside the system that send data

98. A(n) data.

is a person, place, or thing within the system that transforms

99. A(n) accomplished.

specifies where, how, and by whom a system's activities are


100. A(n) shows what activities the system is doing without specifying how, where or by whom the activities are accomplished.

101. A(n) data flow diagram (DFD) depicts what activities the system performs rather than how, where, or by whom they are performed.

102. When the context diagram and the level 0 diagram reflect the equivalent external data flows, the two diagrams are said to be .

103. The successive subdividing, or exploding, of logical data flow diagrams (DFDs) is called .

104. A(n) logical aspects of the system.

gives a complete picture of a system by combining physical and

105. A(n)

is any action being performed by an internal or external entity.

106. filing data.

activities include retrieving data from storage, transforming data, or

107. Processes that handle other-than-normal situations are called or routines.

routines


108. A(n) bubble or data store.

109. When we document a(n) data store/disk symbol.

110. A(n)

is a data flow that leaves a bubble but does not go to any other

system, the central computer will have one

depicts a system and all of its activities as a single bubble.

111. A(n) is a graphical representation of a system showing the system's internal and external entities and flows of data into and out of those entities.

112. A(n) is a graphical representation of a system showing the system processes, data stores, and flows of data into and out of the processes and data stores.

113. A(n) is a graphical representation of a business process, including information processes and the related operations processes.

114. Containing manual and computer activities, the presents a logical and physical rendering of the who, what, how, and where of information and business processes.

115. A(n) flowchart.

is often referred to as a process flowchart or business process


116. A(n) can include actions related to data (send, transform, file or store, retrieve from storage, or receive) or to an operations process.

117. A(n) process activities might include picking goods in the warehouse inspecting goods at the receiving dock, or counting cash.

118. A(n) is a graphical representation of a system that depicts a system's components; the data flows among the components; and the sources, destination, and storage of data.

119. Data entering from outside a system is depicted on a data flow diagram (DFD) as coming from a(n) entity.

120. Data leaving for outside a system is depicted on a data flow diagram (DFD) as going to a(n) entity.

121. Figure TB-4.1 is a "generic" level 0 data flow diagram (DFD), taken from Figure 4.5 in the text. Required: Using good data flow diagram construction techniques draw a diagram to explode bubble 3.0 to its next lower level. Diagram 3.0 should contain three processes, appropriately numbered, and should contain the following data flows in addition to those in the level 0 diagram (see NOTE): a. b. c.

Flow H runs from the first process to the second. Flow I runs from the first process to the third. Flows J and K run from the second process to the third.

NOTE: Assume that the flows shown in the level 0 diagram affect diagram 3.0 as follows: 1. Flow D runs to the first process in diagram 3.0. 2. Flow B runs from the third process in diagram 3.0. 3. The data flow running from the data store runs to the second process in diagram 3.0.


122. Figure TB-4.3 shows a context diagram of a cash sales system. The diagram intentionally violates several of the guidelines and other techniques presented in the text for drawing data flow diagrams. Required: Identify as many of the errors in data flow diagram construction as you can. In the diagram, place consecutive numbers (each in a circle) next to the points at which the errors exist. On your solution sheet, list the numbers and write a one- to two-sentence description of each error and what the correct procedure should be. Error 1 is provided as an example of how to construct the solution (but you must place the circled number 1 on your solution diagram).

Error 1

Error Description Data flows should not connect two external entities. Depending on the extent of the system being analyzed, either the mail room or the bank entity should be eliminated or documented within the system.



123. Figure TB-4.5 shows a level 0 logical data flow diagram for a billing system. Also shown for reference is the context diagram for the system. The logical data flow diagram intentionally violates several of the guidelines and other techniques presented in the text for drawing data flow diagrams. Required: Identify as many of the errors in the logical data flow diagram construction as you can. In the logical data flow diagram, place consecutive numbers (each in a circle) next to the points at which the errors exist. On your solution sheet, list the numbers and write a one- to two-sentence description of each error and what the corrected diagram should depict. If an error occurs in more than one place, mark each occurrence of the error. Error 1 is provided as an example of how to construct the solution. Do not identify nor correct any errors that may exist on the context diagram.

Error 1

Error Description The flow from bubble 2.1 to the Accounts receivable department is not labeled. The flow on the context diagram indicates that copy 3 of the sales invoice is sent to the accounts receivable department. Correction: Add a label to the flow from bubble 2.1 to the Accounts receivable department. But, because data flows on a logical data flow diagram (DFD) should describe the nature of the data not how the data are transmitted, we should label this flow "Recorded sales invoice."



124. Figure TB-4.7 shows several systems flowchart routines that intentionally violate good flowchart construction procedures. Required: Redraw each of the routines so that they conform to the guidelines and other techniques presented in the text for drawing systems flowcharts. HINT: Be alert to the description of each routine; the descriptions should govern your solution.




125. The following narrative describes the order entry process at Adams, Inc.: Narrative Description Adams, Inc. customers mail their orders to the Adams customer service center where clerks open the orders and review them for accuracy. The clerks then key orders into the computer. As the clerk is entering data the computer populates the order input screen with data from the applicable customer and inventory master data. The computer displays the completed order and the clerk reviews the order (assume there are no discrepancies) and then accepts the order (selects the "save" icon on the input screen). The computer then creates a sales order master record, updates the inventory master data to allocate inventory to the sales order, prints a picking ticket in the warehouse, and displays the sales order number to the customer service center clerk. The clerk then reads this number to the customer. Required: a. b. c.

Prepare a table of entities and activities. Prepare a context diagram. Prepare a physical data flow diagram.

126. Adams, Inc. customers mail their orders to the Adams customer service center where clerks open the orders and review them for accuracy. The clerks then key orders into the computer. As the clerk is entering data the computer populates the order input screen with data from the applicable customer and inventory master data. The computer displays the completed order and the clerk reviews the order (assume there are no discrepancies) and then accepts the order (selects the "save" icon on the input screen). The computer then creates a sales order master record, updates the inventory master data to allocate inventory to the sales order, prints a picking ticket in the warehouse, and displays the sales order number to the customer service center clerk. The clerk then reads this number to the customer. Required: a. b. c.

Prepare an annotated table of entities and activities. Indicate on this table the groupings¾bubble numbers and bubble titles¾to be used in preparing the level 0 logical data flow diagram. Prepare a logical data flow diagram (level 0 only). The context diagram of this billing system shows two external entities: customers and the shipping department. Prepare a systems flowchart.


127. The figure below contains 14 symbols used in constructing data flow diagrams or system flowcharts. Each symbol has been assigned a capital letter (A through N) for identification in this problem. The following is a list of 14 data flow diagram or flowcharting symbols:

(1) (2) (3) (4) (5) (6) (7)

Data store (in a data flow diagram) Entity or process (in a data flow diagram) External entity (in a data flow diagram) Document Manual keying Computer process Manual process

(8) (9) (10) (11) (12) (13) (14)

Display Disk Paper file Off-page connector Start/stop Annotation Batch total

Required: Match each symbol to its corresponding description by writing the description number below the each symbol.


128. For each of the following, indicate whether it is a characteristic of a A. B. C.

physical data flow diagram logical data flow diagram systems flowchart

1.

A graphical representation of a system showing the system's processes, data stores, and the flows of data into and out of the processes and data stores. Used by auditors and managers to understand a system and to analyze a system's controls. Depicts a system's infrastructure. Depicts the sequence of activities performed as the business events flow through the process. Includes the operations process and management context for a system. Labels on flows of data describe the nature of the data but not how the data are transmitted. Presents a logical and physical rendering of the who, what, how, and where of information and operations processes. Processes are labeled with nouns. Processes are labeled with verbs. Provides a complete picture of a system by combining the physical and logical aspects of the system. Represents what activities the system is performing, but not how, where or by whom. Specifies where, how, and by whom a system's processes are accomplished.

2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.

129. Compare and contrast the description and use of physical data flow diagrams and logical data flow diagrams.


Chapter 4--Documenting Information Systems Key

1. TRUE 2. TRUE 3. FALSE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. FALSE 9. FALSE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. FALSE 15. TRUE 16. FALSE 17. TRUE 18. TRUE 19. FALSE 20. FALSE 21. FALSE 22. TRUE 23. TRUE 24. FALSE 25. TRUE 26. TRUE 27. TRUE 28. FALSE 29. TRUE


30. TRUE 31. FALSE 32. TRUE 33. FALSE 34. TRUE 35. TRUE 36. FALSE 37. TRUE 38. FALSE 39. TRUE 40. FALSE 41. C 42. B 43. D 44. B 45. D 46. C 47. A 48. C 49. A 50. C 51. A 52. A 53. C 54. D 55. D 56. B 57. C 58. D 59. B 60. C 61. A 62. C 63. C


64. A 65. C 66. D 67. B 68. A 69. C 70. A 71. D 72. C 73. D 74. D 75. B 76. A 77. C 78. B 79. B 80. B 81. D 82. B 83. C 84. A 85. A 86. C 87. B 88. D 89. D 90. D 91. bubble 92. data flow 93. two horizontal parallel lines 94. external entity 95. context diagram 96. context diagram 97. External entities


98. internal entity 99. physical data flow diagram or physical data flow diagram (DFD) or physical DFD 100. logical data flow diagram or logical data flow diagram (DFD) or logical DFD 101. logical 102. balanced 103. top-down partitioning 104. systems flowchart 105. activity 106. Information processing 107. exception, error or error, exception 108. reject stub 109. enterprise 110. context diagram 111. physical data flow diagram or physical data flow diagram (DFD) or physical DFD 112. logical data flow diagram or logical data flow diagram (DFD) or logical DFD 113. systems flowchart 114. systems flowchart 115. systems flowchart 116. activity 117. operations 118. data flow diagram or data flow diagram (DFD) or DFD 119. source 120. destination


121. 122. INSTRUCTOR NOTE: You may wish to modify the requirement in one of two ways: (1) Have the students redraw the diagrams instead of describing the errors or (2) limit the number of errors required in the solution to something less than the entire population. (Figure TB-4.4, an annotated version of Figure TB-4.3, shows the location of each error.) Error 2 3 4 5

Error Description When multiple entities operate identically, one box can represent all. Eliminate all but one customer box and label it "Cash customer." A context diagram should have only one bubble. Since the problem states that we are analyzing a cash sales system, eliminate this bubble. In the context diagram and level 0 diagram, logical rather than physical labels should be used. Eliminate the reference to Form S92 and Sales slip and replace it with a logical label such as "Sales data." The symbols used for the sales transaction event data file is incorrect. In a DFD, the file symbol is a pair of parallel, horizontal lines.


123. INSTRUCTOR NOTE: You may wish to modify the requirement in one of two ways: (1) Have the students redraw the diagram instead of describing the errors or (2) limit the number of errors required in the solution to something less than the entire population. (Figure TB-4.6, an annotated version of the logical data flow diagram in Figure TB-4.5, shows the location of each error.) Error 2 3

4

5 6 7

8

Error Description The bubbles in the level 0 data flow diagram are numbered 1.0, 2.0, etc. Correction: Change the bubble labels as follows: bubble 1.1 becomes 1.0, 2.1 becomes 2.0, and 3.1 becomes 3.0. In a logical DFD, the process labels should contain verbs describing what is done. The label in the first bubble is a noun, referring to a physical entity. Correction: Change the label of bubble 1.1 (corrected to 1.0) to say something like "Prepare sales invoice." Sales invoice copy 2 flow from bubble 3.1 (corrected to 3.0) to bubble 1.0. In a logical DFD, there can be no backward flows. Correction: Eliminate the backward flow or send it to a subsequent process bubble for action, or file copy 2 of the sales invoice at bubble 3.0. The symbols used for the price list, and inventory master data are incorrect. Correction: Change the symbols for these two files to a pair of parallel, horizontal lines. Reject stubs should appear only in lower-level data flow diagrams. Correction: Eliminate the reject stub. The Sales invoice data flow should be from the 1.0 bubble to the customer (see the context diagram. Also, the flow label indicates how the data is transmitted rather than the nature of the flow. Correction: Change the direction of the flow and label the flow "Sales invoice." Instructor Note: Several flows have physical labels indicating how the data are transmitted instead of the nature of the flow. Corrections: Remove "original" (see correction number 7), "copy 2", and "copy 3" from the sales invoice flows.



124. INSTRUCTOR NOTE: You may wish to modify the requirement in one of two ways: (1) Have the students describe the violations instead of redrawing the flowchart segments or (2) limit the number of drawings required in the solution to only certain of the routines in Figure TB-4.7




125. INSTRUCTOR NOTE: This problem requires students to prepare selected components of systems documentation. In contrast, Instructors wishing to focus on the creation of data flow diagrams can provide their students with the solution to part a. a.

Table of Entities and Activities Entities Para Customer

1

Activit ies 1. Mail orders

Customer service center (clerks)

1 1 1

2. 3. 4.

Open orders Review orders Enter (key) orders into computer

Computer

1 1

5. 6.

Populate inputs with data from customer and inventory master data Display order

Customer service center (clerks)

1 1

7. 8.

Review order Accept order

Computer

1 1 1 1

9. 10. 11. 11.

Create sales order master record Update inventory master data to allocate inventory Print picking ticket in the warehouse Display sales order number

Customer service center (clerks)

1

12.

Read sales order number to customer

Warehouse

1

b.

Context diagram.

c.

Physical DFD



126. INSTRUCTOR NOTE: This problem requires students to prepare selected components of systems documentation. Instructors wishing their students to prepare all systems documentation should use Problems 5 & 6 (in the original banks). a.

Table of Entities and Activities (annotated) Entities

Para 1 1

Activities 2. Open orders 3. Review orders

1

4. Enter (keys) orders into computer

1 1

5. Populate inputs with data from customer and inventory master data 6. Display order

Customer service center (clerks)

1 1

7. Review order 8. Accept order

Computer

1 1

9. Create sales order master record 10. Update inventory master data to allocate inventory 11. Print picking ticket in the warehouse 11. Display sales order number

Customer service center (clerks)

Computer

1 1 Customer service center (clerks) b.

Logical DFD.

c.

Systems flowchart

12. Read sales order number to customer

Processes 1.0 Enter customer order

2.0 Verify and accept customer order

3.0 Record customer order



127. A. B. C. D. E. F. G.

(7) (8) (6) (10) (3) (14) (1)

128. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.

B C A B and C NOTE: Both a logical DFD and a systems flowchart depict the sequence of activities through a process. C B C A B C B A

H. I. J. K. L. M. N.

(12) (2) (11) (13) (5) (9) (4)

129. A physical data flow diagram is a graphical representation of a system showing the system's internal and external entities, and the flows of data into and out of these entities. Physical data flow diagrams specify where, how, and by whom a system's processes are accomplished. A physical data flow diagram does not tell us what activities are being accomplished. A logical data flow diagram is a graphical representation of a system showing the system's processes, data stores, and the flows of data into and out of the processes and data stores. Logical data flow diagrams are used to document information systems because they represent the logical nature of a system¾what activities the system is performing¾without having to specify how, where, or by whom the activities are accomplished. The advantage of a logical DFD (versus a physical DFD) is that we can concentrate on the functions that a system performs.


Chapter 5--Database Management Systems Student: 1. Business processes, such as hiring employees, purchasing inventory, and collecting cash from customers, are called events. True False

2. The traditional applications approach to business event processing concentrates on the process being performed. True False

3. The centralized database approach to business event processing, in which facts about events are stored in relational database tables instead of separate files, solves many of the problems caused by data redundancy. True False

4. When different information about the same fact is stored in different files the integrity of the data is violated. True False

5. A database management system (DBMS) is a set of standalone programs designed to complicate the tasks of creating, accessing, and managing data. True False

6. The database administrator is responsible for administrative and technical issues related to the database management system. True False

7. The database management system, containing data related to all an organization's applications, supports normal data processing needs and enhances the organization's management activities by providing data useful to managers. True False


8. Data independence refers to decoupling the data from the system applications, and it is a major difference between the centralized database approach and the applications approach. True False

9. Classifying data refers to grouping or categorizing data according to some common attributes. True False

10. Another name for sequential coding is block coding. True False

11. The uniform product codes (UPCs) used by supermarkets and other retailers are examples of a block coding scheme. True False

12. Both the mnemonic and the hierarchical coding schemes attach specific meaning to particular character positions. True False

13. Because it uses alphabetic characters, a sequential coding system is most understandable to human beings. True False

14. A check digit is a code that includes an extra digit to a code in order to check the accuracy with which the code is keyed into a computer. True False

15. The centralized database approach to data management concentrates on the process being performed, rather than on the data themselves. True False

16. A DBMS is a set of integrated computer programs designed to simplify the tasks of creating, accessing, and managing a centralized database. True False


17. The applications approach to data management decouples the data from the applications or other users of the data. True False

18. In the network database model, a child record can have more than one parent record. True False

19. A description of a portion of a schema is referred to as a subschema. True False

20. A scanner is used to access a database and to produce inquiry reports. True False

21. Data warehousing is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data. True False

22. Data redundancy allows non-technical users to bypass the programmer and to access the database directly. True False

23. Data mining refers to the exploration, aggregation, and analysis of large quantities of varied data from across the organization. True False

24. A data model for a database is often depicted using entity-relationship diagrams. True False

25. A data model depicts user requirements for data stored in a database. True False


26. A secondary key uniquely identifies any row within a relational table. True False

27. An attribute is equivalent to a field and may also be known as a row. True False

28. In a hierarchical database model, all record relationships are 3:N. True False

29. In a hierarchical database model, a child record may only have one parent. True False

30. In a relational database model, data are logically organized into two-dimensional tables. True False

31. In a network database model, data are logically organized into two-dimensional tables. True False

32. An object-oriented database system is a database that allows both simple and complex objects to be stored using abstract data types. True False

33. The normalization process involves the application of various rules (called normal forms) that yields relational tables that are free of anomalies. True False

34. An unnormalized table is a table that contains repeating attributes (or fields) within each row (or record). True False

35. A table is in second normal form (2NF), if it does not contain repeating groups. True False


36. A table is in first normal form (1NF) if it has no partial dependencies; that is, no non-key attribute is dependent on only a portion of the primary key. True False

37. Update anomalies are problems in a relation table caused by the existence of functional dependencies. True False

38. A relation is in third normal form (3NF) if it is in first normal form and no nonkey attribute is dependent on only a portion of the primary key. True False

39. A partial dependency happens when an attribute that is dependent on a portion of the primary key not on the entire key. True False

40. An attribute is an item of data that characterizes an entity or relationship. True False

41. Each relationship has a characteristic, called a cardinality that shows the degree to which each entity participates in the relationship. True False

42. Maximum cardinality is used to specify the minimum level of participation that one entity can have with another entity. True False

43. In set theory, a two-dimensional collection of information is called a relation. True False

44. A spreadsheet is a typical component of a decision support system. True False


45. Executive information systems use complex processing and calculations to determine a solution to a problem. True False

46. Group Support Systems (GSS) focus on such functions as e-mail, scheduling, and document sharing. True False

47. An expert system helps make complex decisions consistently. True False

48. A neural network is a software program that may be integrated into DSS or other software tools. True False

49. An intelligent agent is a computer-based system of hardware and software that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information. True False

50. Knowledge management is the process of capturing, storing, retrieving, and distributing the knowledge of the individuals in an organization for use by others in the organization to improve the quantity and/or efficiency of decision making. True False

51. Data warehousing and data mining are driving many new DBMS implementations. True False

52. Data redundancy: A. occurs when data is stored in multiple locations B. is eliminated by using the applications approach C. reduces labor and storage costs D. improves consistency between applications


53. Which of the following statements related to the event-driven approach is false? A. It attempts to describe all aspects of business events. B. It is also referred to as the top-down approach. C. It focuses on how users interact with business events and processes. D. It usually results in a better database design than the bottom-up approach.

54. A record layout depicts: A. the characters comprising a field B. the fields comprising a record C. the records comprising a file D. the characters comprising a record

55. Grouping or categorizing data according to common attributes is called: A. coding data B. filing data C. classifying data D. updating data

56. Another name for sequential coding is: A. block coding B. serial coding C. hierarchical coding D. significant digit coding

57. The uniform product codes (UPC) used in supermarkets is a type of: A. block code B. serial code C. hierarchical code D. significant digit code


58. A company uses a 7-digit number to identify customers. For example, the customer 1532789 indicates the following information: digits 1-2, state, 15 = Georgia digit 3, type of organization, 3 = government agency digit 4, credit terms, 2 = 2/10, n/30 digits 5-7, unique customer identifier, 789 This type of coding scheme is: A. hierarchical B. block C. significant digit D. sequential

59. A postal ZIP code is an example of which of the following coding schemes? A. block code B. serial code C. hierarchical code D. significant digit code

60. The coding system that is most understandable by human information processors is: A. serial coding B. hierarchical coding C. block coding D. mnemonic coding

61. Which of the following is the most likely coding scheme for college courses? A. hierarchical coding B. sequential coding C. block coding D. mnemonic coding

62. An extra character added to a numeric code as a device to test the accuracy of data entered into a computer system is called a: A. control digit B. check digit C. mnemonic digit D. significant digit


63. Assigning numbers to objects in chronological sequence is known as: A. block coding B. mnemonic coding C. sequential coding D. check digit coding

64. The concentrates on the process being performed with data playing a secondary or supporting role. A. database management approach B. hierarchical data management approach C. transaction processing approach D. applications approach

65. Which of the following statements regarding the centralized database approach to data management is false? A. Facts about events are stored in relational database tables. B. Users can access and manipulate data using their own models. C. The approach eliminates many of the problems caused by data redundancy. D. In this approach, data and applications are dependent on each other.

66. The computer software needed to implement a database approach to data management that is not needed with the applications approach to data management is: A. operating system software B. database management system (DBMS) software C. application program software D. query language software

67. Which of the following is not a database model discussed in Chapter 5: A. Relational B. Hierarchical C. Network D. Physical

68. The feature of a database management system that enables nontechnical users to access a database and to produce inquiry reports is the: A. Schema B. query language C. Subschema D. logical database view


69. Decoupling the data from the system applications is a major difference between the centralized database approach and the applications approach and is known as: A. data independence B. data manipulation C. data redundancy D. query language

70. With the centralized database approach to data management, we expect to have: A. increased data storage costs B. improved data integrity C. increased data redundancy D. greater difficulty in performing file maintenance

71. Which of the following advantages of the centralized database approach does not occur because of a reduction in data redundancy? A. reduced storage costs B. easier maintenance C. increased data integrity D. reduced user and programmer training

72. Which of the following is not a function that a database management system performs? A. Defining the data. B. Defining the relations among data. C. Interfacing with the operating system for storage of the data on the physical media. D. Coordinates access to data stored in the applications programs.

73. The exploration, aggregation, and analysis of large quantities of varied data from across the organization is known as: A. data independence B. data mining C. data redundancy D. data warehousing


74. Which of the following statements related to events-driven systems is false? A. In events-driven systems data is aggregated and maintained in its original form. B. With an events-driven system management views information systems processing as a decision-support activity. C. Organizations adopting an events-driven system are focused on capturing data for the purpose of generating reports. D. Users should be able to access and manipulate data using their own models and their own data aggregations.

75. A(n) reflects a system's key entities and the relationship among them. A. data flow diagram B. relational table C. program flowchart D. entity-relationship diagram

76. A resource, event, or agent about which data are collected is called: A. an attribute B. an entity C. a relationship D. a query

77. In an entity-relationship diagram, A. squares B. circles C. diamonds D. parallelograms

are used to show the characteristics of relationships.

78. A data model depicts the requirements for data as specified by the: A. database B. enterprise C. user D. database administrator

79. In a(n) database model, records are organized in a pyramid structure. A. hierarchical B. relational C. network D. object-oriented


80. The database model works well for simple data structures, but falls apart quickly when the data becomes more complex. A. Hierarchical B. Relational C. Network D. object-oriented

81. In a(n) database model, a child record may have more than one parent. A. hierarchical B. relational C. network D. object-oriented

82. databases include abstract data types that allow users to define characteristics of the data to be stored when developing an application. A. hierarchical B. relational C. network D. object-oriented

83. In a(n) database model, data are logically organized into two-dimensional tables. A. hierarchical B. relational C. network D. object-oriented

84. The use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data is known as: A. data independence B. data mining C. data redundancy D. data warehousing

85. In an object-oriented database model, what types of objects can be stored through use of abstract data types, inheritance, and encapsulation? A. simple B. complex C. both simple and complex D. neither simple nor complex


86. Object-oriented databases: A. include abstract data types B. organize data in two-dimensional tables C. are inferior to relational databases D. are used by most organizations

87. If attribute A determines a single value for attribute B at any time, we say that attribute B is A. a parent of attribute A B. a child of attribute A C. functionally dependent on attribute A D. networked to attribute A

88. A relation that is in A. unnormalized B. first normal (1NF) C. second normal (2NF) D. third normal (3NF)

form contains repeating attributes within each row or record.

89. A relation is in second normal form (2NF) if it is in first normal form (1NF) and: A. if the only determinants it contains are candidate keys. B. no non-key attribute is dependent on only a portion of the primary key. C. it does not contain any repeating groups. D. computed fields are eliminated.

90. Of the following options, a database that is in A. unnormalized B. first normal (1NF) C. second normal (2NF) D. third normal (3NF)

form has the best design.

91. The applications approach to business event processing: A. concentrates on integrated applications B. uses a central database C. has data redundancy D. none of the above

.


92. Running an applications approach to sales and inventory programs leads to: A. a central database B. data redundancy C. higher efficiencies D. reports that are easier to query

93. Data flows that mirror and monitor business operations are called A. horizontal information B. vertical information C. Sequential D. master data

flows.

94. Data flows that provide a basis for managerial decisions are called A. horizontal B. vertical C. sequential D. master

information flows.

95. The approach to business event processing in which facts are stored in a relational database is: A. the centralized database approach B. the applications approach C. the logical approach D. none of the above

96. In a DBMS, a complete description of the configuration of record types, data items and the relationships among them is known as: A. query language B. Subschema C. Schema D. DML

97. A describes a portion of a DBMS' configuration of record types and data items and the relationships among them. A. query language B. Subschema C. Schema D. DML


98. The way a user thinks of the data in a database is called the user's: A. physical view B. logical view C. data entry view D. screen view

99. Which of the following statements is true of a hierarchical DBMS? A. child records can have more than one parent record B. parent records can have many child records C. the DBMS works well with complex data D. all of the above

100. Which of the following statements is true of a network database model? A. child records can have more than one parent record B. parent records can have many child records C. both a and b D. none of the above

101. The model that only works well for simple data structures is the: A. hierarchical database model B. network database model C. relational database model D. object-oriented database model

102. The model that logically organizes data into two-dimensional tables is the: A. hierarchical database model B. network database model C. relational database model D. object-oriented database model

103. The model that includes abstract types that allow users to define data to be stored in the database is the: A. hierarchical database model B. network database model C. relational database model D. object-oriented database model


104. A unique identifier that serves as an address for each row in a database is called: A. the query B. the primary key C. the composite key D. the form

105. In the applications approach to business event processing, a data change in one application before updating another application could lead to: A. Update B. inconsistent data C. Additions D. Deletions

106. A(n) depicts user requirements for data stored in a database. A. data model B. entity-relationship model C. E-R diagram D. all of the above

107. In creating an entity-relationship diagram, the correct sequence of steps is: A. create tables, identify entities, identify relationships B. identify relationships, identify entities, create tables C. identify entities, identify relationships, create tables D. create tables, identify relationships, identify entities


108. For the following diagram, which item is the entity?

A. Students B. Name C. Address D. Street

109. The mapping of the relationships between entities would be used in the development of a(n): A. context diagram B. physical DFD C. logical DFD D. E-R diagram

110. Which of the following is not a relationship type? A. one-to-many B. one-to-one C. one-to-few D. many-to-many

111. Which of the following database types has dominance in contemporary systems? A. Relational B. object-oriented C. Network D. Hierarchical


112. Each relationship in an E-R diagram has a the relationship. A. maximum cardinality B. Identifier C. Cardinality D. primary key

that shows the degree to which each entity participates in

113. A decision maker prepares a presentation in a suitable format for a given decision at a given point in time when using a(n): A. neural network (NN) B. expert system (ES) C. group support system (GSS) D. decision support system (DSS)

114. The principal difference between an executive information system (EIS) and a decision support system (DSS) is that an EIS: A. suggests to the user the best choice from among alternative courses of action whereas the DSS merely provides information that could assist in making the decision B. is primarily about collecting and presenting information without doing additional processing or calculations C. uses both external and internal data whereas a DSS does not D. employs decision models whereas a DSS does not

115. The information system which emulates the problem-solving techniques of humans is called a(n): A. executive information system (EIS) B. group support system (GSS) C. decision support system (DSS) D. expert system (ES)

116. Which of the following statements about expert systems (ES) is false: A. They can help provide a competitive advantage. B. They are sometimes used as part of a down-sizing strategy. C. They only work well for simple decisions. D. They can be used to train new employees.


117. The computer-based system of hardware and software that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information is referred to as: A. group support systems B. executive information system C. decision support system D. neural networks

118. A software program that may be integrated into DSS or other software tools is a(n): A. group support systems B. executive information system C. intelligent agent D. neural networks

119. A meaningful change in the state of an enterprise such as hiring employees, purchasing inventory, and collecting cash from customers are called .

120. The approach to database design attempts to describe all aspects of the business events and processes under consideration.

121. Analyzing collected historical data with multidimensional analytic tools and exploratory techniques is called .

122. Primary key row.

in a relational table must be a unique identifier for a

123. In the manages its own data.

to business event processing, each application collects and

124. A(n)

depicts the fields comprising a record.


125. attributes.

is the process of grouping or categorizing data according to common

126. Another name for sequential coding is

coding.

127. The uniform product codes (UPCs) used by supermarkets and other retailers are examples of a(n) coding scheme.

128. coding schemes attach specific meaning to particular character positions by ordering items in descending order where each successive rank order is a subset of the rank above it.

129. Because it uses alphabetic characters, a(n) easier for human beings to remember the codes.

130. A(n) the accuracy of the code.

coding system makes it

is a code that includes an extra digit that can be used to check

131. The approach to business event processing concentrates on the process being performed, with data playing a secondary or supportive role to the programs.

132. A(n) creating, accessing, and managing a database.

is a set of integrated programs designed to simplify the tasks of


133. Decoupling the data from the system applications is called

.

134. Systems that decouple data from system applications are often referred to as having architecture.

135. The way a user thinks of data in a database is called the user's

136. The

is the way data is actually stored on computer hardware.

137. A description of a portion of a schema is referred to as a(n)

138. A(n) reports.

.

.

language is used to access a database and to produce inquiry

139. is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data.

140. refers to the exploration, aggregation, and analysis of large quantities of varied data from across the organization.

141.

is the most popular data modeling approach.


142. In developing a data model, the term between entities.

describes an association

143. A(n)

depicts user requirements for data stored in a database.

144. A(n) access the database directly.

allows non-technical users to bypass the programmer and to

145.

146. A(n)

147. Database table stored in a table.

is another name for query language.

uniquely identifies any row within a relational table.

each store one specific attribute of the type of things

148. In a(n) structure.

database model, records are organized in a pyramid

149. In a(n) parent.

database model, a child record may have more than one

150. In a(n) two-dimensional tables.

database model, data are logically organized into


151. A(n) database model allows both simple and complex objects, including video clips and pictures, to be stored.

152. The goal of relationships that are in 3NF.

is to produce a database model that contains

153. An attribute is determines a value for the second attribute at any time.

on a second attribute if the value for the first attribute

154. A(n) primary key not on the entire key.

happens when an attribute is dependent on a portion of the

155. A(n) (or record).

table contains repeating attributes (or fields) within each row

156. A relation is in

157. dependencies.

if it does not contain repeating groups.

are problems in a relation table caused by the existence of functional

158. A table is in dependent on only a portion of the primary key.

if it is in first normal form and no non-key attribute is


159. A(n) appear in the database.

is the attribute whose value is unique for every entity that will

160. have in another entity.

is a measure of the highest level of participation that one entity can

161. In set theory, a two-dimensional collection of information is called a(n) .

162. A(n) is an information system that assists managers with unstructured decisions by retrieving and analyzing data for purposes of identifying and generating useful information.

163. A(n) is mainly about collecting and presenting information and less about doing additional processing and calculations.

164. A(n) is a computer-based system that supports collaborative intellectual work such as idea generation, elaboration, analysis, synthesis, information sharing, and decision making.

165. A computer's ability to imitate human decision making when confronting situations that are complex and ambiguous is called .

166. A(n) employees.

can be used to capture and retain the expertise of retiring


167. A(n) is a software program integrated into a decision support system or other software tool that can perform tasks without further direction from the user.

168. A(n) is a computer hardware and software system that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information.

169. is the process of capturing, storing, retrieving, and distributing the knowledge of the individuals in an organization for use by others in the organization to improve the quantity and efficiency of decision making.

170. is a method for freely and creatively generating as many ideas as possible without undue regard for their practicality or realism.

171. List 1 shows the coding schemes discussed and illustrated in Chapter 5, while List 2 contains eight coding examples.

List 1 Coding Schemes A. Sequential (serial) B. Block C. Significant digit

D. E. F.

Hierarchical Mnemonic Check digit


List 2 Coding Examples 1. Sue Smith is taking three college courses this semester¾AC 340, FI 101, and EN 280. When you check with the Registrar's Office, you learn that Sue is enrolled in Accounting Information Systems, Principles of Finance, and English Literature. 2.

Pat Conroy's ZIP code is 29902. The first digit shows that Pat resides in South Carolina. The last two digits (02) indicate that he lives in the town of Beaufort, which is located in Beaufort County¾design ated by the digits 99.

3.

Joe Langdon was the 151st employee hired by Acme Company. His employee ID number is 151.


4.

The uniform product code for an 18-ounce jar of Peter Pan Smart Choice peanut butter is 45300 00227, while the 28-ounce size of the same product has a code of 45300 00220. Both are manufactured by Hunt-Wesson, Inc., as indicated by the first five digits (45300) of the UPC.

5.

Will Wodger's charge account number with J. C. Penney Co. is 923456-7. The 7 on the end of the number was generated by a computer algorithm in order to verify the accuracy with which the first six digits (923456) are keyed into the computer.

6.

Part of Xylox, Inc.'s general ledger chart of accounts reveals the following: Acc. # Account Title 1111 Petty Cash 1112 Change Fund 1113 Cash in Bank 1121 Trade Account Receivab les You learn from the company's controller that the account numbers mean the following:


7.

First digit -

1XXX

Second digit -

1XX

Third digit -

1X

Fourth digit -

1

An example of a customer number at Fixit's Hardware is 1 0 3 548, where:

A ss et s C u rr e nt A ss et s C u rr e nt A ss et T y p e ( 1 X = C a s h; 2 X = R e c ei v a bl e s) S p e ci fi c a c c o u nt


1

=

0

=

3

=

R et ai l o r w h ol e s al e c u st o m er S al e s ta x o r n ot ( 1 = ta x; 0 = n o ta x ) S al e s ta x c o d e ( u s e d to lo o k u p th e ta x ra te )


548

8.

=

U ni q u e id e nt if ie r o f a s p e ci fi c c u st o m er

Rachel Rigby's employee number is AFP-293. Rachel works in the Assembly Department (A), is a full-time employee (F), and is paid on a piecework basis (P). The 293 is her unique identifier.

Required: On your solution sheet, list the numbers 1 through 8 from List 2. Next to each number, show the capital letter from List 1 that best describes the coding type represented by each example. HINT: Some letters from List 1 may be used for more than one coding example, while some letters may not be used at all.


172. Normalize the database structure in Figure TB 5.1 by transforming it into first normal form (1NF).


173. Transform the relation in Figure TB 5.3 to second normal form (2NF). Label each new relation with a name that describes the attributes.


174. Transform the relation in Figure TB 5.5 to third normal form (3NF). Label each new relation with a name that describes the attributes.

175. Given the following:

List 1 Terms A. B. C. D. E.

data mining data warehousing decision support system executive information system expert system

F. G. H. I.

group support system intelligent agent knowledge management neural network


List 2 Descripti ons 1. This applies expertise extracted from a human expert to provide specific recommendations on problems or decisions. 2.

These systems are mainly about collecting and presenting information and often have the ability to drill down.

3.

This is a computer hardware and software system that mimics the human brain's ability to recognize patterns or predict outcomes using less-than-complete information.

4.

This is a computer-based system that supports collaborative intellectual work such as idea generation, elaboration, analysis, synthesis, information sharing, and decision making.

5.

This is a software program that may be integrated into a decision support system or other software tool (such as word processing, spreadsheet, or database packages).

6.

A spreadsheet is a typical component of this system.

7.

This is the process of capturing, storing, retrieving, and distributing the knowledge of the individuals in an organization for use by others in the organization to improve the quality and efficiency of decision making across the firm.

8.

This is the use of information systems facilities to focus on the collection, organization, integration, and long-term storage of entity-wide data.

9.

This is used to better understand an organization's business processes, trends within these processes, and potential opportunities to improve the effectiveness and efficiency of the organization.

Required: On your solution sheet, list the numbers 1 through 9 from List 2. Next to each number, show the capital letter from List 1 that best fits the description from List 2.


Chapter 5--Database Management Systems Key

1. TRUE 2. TRUE 3. TRUE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. TRUE 9. TRUE 10. FALSE 11. TRUE 12. FALSE 13. FALSE 14. TRUE 15. FALSE 16. TRUE 17. FALSE 18. TRUE 19. TRUE 20. FALSE 21. TRUE 22. FALSE 23. TRUE 24. TRUE 25. TRUE 26. FALSE 27. FALSE 28. FALSE 29. TRUE


30. TRUE 31. FALSE 32. TRUE 33. TRUE 34. TRUE 35. FALSE 36. FALSE 37. TRUE 38. FALSE 39. TRUE 40. TRUE 41. TRUE 42. FALSE 43. TRUE 44. TRUE 45. FALSE 46. FALSE 47. TRUE 48. FALSE 49. FALSE 50. TRUE 51. TRUE 52. A 53. C 54. B 55. C 56. B 57. A 58. C 59. C 60. D 61. D 62. B 63. C


64. D 65. D 66. B 67. D 68. B 69. A 70. B 71. D 72. D 73. B 74. C 75. D 76. B 77. C 78. C 79. A 80. A 81. C 82. D 83. B 84. D 85. C 86. A 87. C 88. A 89. B 90. D 91. C 92. B 93. A 94. B 95. A 96. C 97. B


98. B 99. B 100. C 101. A 102. C 103. D 104. B 105. B 106. D 107. C 108. A 109. D 110. C 111. A 112. C 113. D 114. B 115. D 116. C 117. D 118. C 119. business events 120. Event-driven 121. data mining 122. fields 123. applications approach 124. record layout 125. Classifying 126. serial 127. block 128. Hierarchical 129. mnemonic 130. check digit 131. applications


132. database management system (DBMS) or database management system or DBMS 133. data independence 134. three-tier 135. logical view 136. physical view 137. subschema 138. query 139. Data warehousing 140. Data mining 141. Entity-relationship (E-R) modeling or Entity-relationship modeling or E-R modeling 142. relationship 143. data model 144. query language or data manipulation language (DML) or data manipulation language or DML 145. Data manipulation language (DML) or DML or Data manipulation language 146. primary key 147. columns 148. hierarchical 149. network 150. relational 151. object-oriented 152. normalization 153. functionally dependent 154. partial dependency 155. unnormalized 156. first normal form (1NF) or 1NF or first normal form 157. Update anomalies 158. second normal form (2NF) or 2NF or second normal form 159. primary key attribute 160. Maximum cardinality 161. relation 162. Decision support system or Decision support system (DSS) or DSS 163. Executive information systems or Executive information system (EIS) or EIS 164. group support system or group decision support system or group support system (GSS) or group decision support system (GDSS) or GSS or GDSS 165. artificial intelligence


166. Expert system or Expert system (ES) or ES 167. intelligent agent 168. neural network or neural network (NN) or NN 169. Knowledge management 170. Brainstorming 171. 1. 2. 3. 4.

172.

E D A B

5. 6. 7. 8.

F D C E


173.

174. 175. 1. 2. 3. 4. 5.

E D I F G

6. 7. 8. 9.

C H B A


Chapter 6--Relational Databases and SQL Student: 1. An entity in an accounting system can be classified as a resource, event or agent about which data are collected. True False

2. Attributes are often called fields. True False

3. A model is a complex representation of a simple entity or phenomenon. True False

4. A primary attribute is the attribute whose value is unique for every entity that will appear in the database. True False

5. The customer street address is often used as the key attribute in an REA diagram. True False

6. In an REA diagram, the rectangle is used to represent the composite attribute. True False

7. The first step in identifying all the relationships that should be included in a model is to identify users' existing and desired information. True False

8. Relationships map and define the way in which data can be extracted from a database. True False


9. A recursive relationship occurs between two different instances of an entity. True False

10. Representing supervisors and their employees as separate entities in the model can lead to data redundancy. True False

11. A recursive relationship is created when there is an employee being supervised, and another employee is the supervisor. True False

12. The cardinality constraint is used less frequently than the participation constraint. True False

13. The cardinality constraint is used to specify both the minimum and maximum participation of one entity in the relationship with the other entity. True False

14. The notation 1:N is used to specify the relationship type of one-to-many. True False

15. The notation of (1,1) is used to specify the relationship type of one-to-many. True False

16. REA stands for resources, entities and agents. True False

17. The fundamental requirement for moving toward an event-driven model is the complete integration of data related to an organization's business events. True False


18. A legacy system is one that has existed in an organization for less than one year. True False

19. A collection of data representing multiple occurrences of a resource, event, or agent is known as a relation. True False

20. A set of data that describes a single instance of the entity represented by a relation is known as a tuple. True False

21. A missing value is called a non-null. True False

22. The secondary key is specified to uniquely identity each tuple in the relation. True False

23. SQL is a powerful database language that can be used to define database systems, query the database for information, generate reports from the database, and access databases from within programs using embedded commands. True False

24. Relational integrity specifies that for every attribute in one relation that has been specified to allow reference to another relation, the tuple being referenced must remain intact. True False

25. A relation in an ER model is the same as an entity in the REA model. True False

26. Most DBMS available today that include SQL also include mechanisms within the DBMS itself for establishing and enforcing referential integrity. True False


27. The INSERT command is used to add a single tuple to an existing relation. True False

28. The UPDATE command demonstrates one of the weaknesses in most forms of SQL. True False

29. The DELETE command is used when we want to change one or more attribute values. True False

30. Queries of a database are driven by SELECT commands. True False

31. Referential integrity specifies that for every attribute value in one relation that has been specified to allow reference to another relation, the tuple being referenced must remain intact. True False

32. Knowledge management uses state-of-the art information technologies for storing and analyzing data to help managers make the best possible decisions for their companies. True False

33. Business intelligence (BI) has been ranked as one of the top six "key areas" of current developments in business information technology. True False

34. Spreadsheets that are kept offline to an organization's enterprise systems can improve internal control. True False

35. Composite attributes consist of multiple subattributes. True False


36. An entity can be classified as all of the following except: A. resource B. event C. tuple D. agent

37. A(n) of an entity is one specific thing of the type defined by the entity. A. agent B. composite attribute C. attribute D. instance

38. A(n) is an item of data that characterizes an entity or relationship. A. agent B. composite attribute C. attribute D. instance

39. Which of the following is the entity or agent? A. Client B. client number C. client name D. client street address

40. Which of the following is the key attribute? A. Client B. client number C. client name D. client street address

41. Which of the following is an attribute but least likely to be the key attribute? A. Client B. client number C. client name D. client street address


42. Which of the following is a composite attribute? A. Client B. client number C. client name D. client street address

43. A data field in a traditional file is similar to a relational: A. Table B. Attribute C. Tuple D. Row

44. For the following entity and attribute model, what would be the key attribute of the Students entity?

A. social security number B. name C. address D. street

45. A key attribute is the attribute whose value is: A. undeterminable B. unique C. large D. the same for all attributes


46. The mapping of the relationships between entities would be used in the development of a(n): A. context diagram B. logical DFD C. physical DFD D. REA Model

47. The sequence of steps in identifying relationships in a model is: A. evaluate entities as pairs, identify user existing and desired information, evaluate each entity to determine if there is any need for two occurrences of the same entity type to be linked B. identify user's existing and desired information, evaluate entities as pairs, evaluate each entity to determine if there is any need for two occurrences of the same entity type to be linked C. evaluate entities as pairs, evaluate each entity to determine if there is any need for two occurrences of the same entity type to be linked, identify user existing and desired information D. evaluate each entity to determine if there is any need for two occurrences of the same entity type to be linked, evaluate entities as pairs, identify user existing and desired information

48. Which of the following statements about the participation constraint is false? A. It specifies the degree of minimum participation of one entity in the relationship with the other entity. B. The constraint is either 1 or 0. C. It is the most common constraint in E-R diagrams. D. It provides more information than the cardinality constraint.

49. Which of the following is not a relationship type? A. one-to-many B. one-to-one C. one-to-few D. many-to-many

50. Which relationship type does (1:N) mean? A. one-to-many B. one-to-one C. one-to-few D. many-to-many

51. The cardinality constraint: A. specifies the degree of minimum participation of one entity in the relationship with the other entity. B. provides more information than the participation constraint. C. is the most common constraint specified in E-R diagrams. D. all of the above.


52. Customers of Hanson Company, a home furnishings wholesaler, place orders by contacting a sales representative via a toll-free number. Which is the appropriate relationship type for this relationship?

A. 1:1 B. 1:N C. N:M D. N:1

53. The constraint that is specifies the degree of minimum participation of one entity in the relationship with the other entity is called: A. cardinality constraint B. participation constraint C. economic constraint D. logical constraint

54. Students at Macom University use a Web-based course registration system. Identify the participation constraint of the following data model relationship. The university maintains student records until they graduate or do not enroll in a course for a 3-year period.

A. N:M B. 1:N C. (1,1):(0,N) D. (1,1):(1,N)

55. Common aspects of business intelligence include: A. access to massive amounts of data B. use spreadsheets C. do not require an extensive overhaul of the information system D. all of the above


56. A set of data that describes a single instance of the entity represented by a relation is known as a(n) A. Tuple B. Resource C. Agent D. Event

.

57. Legacy systems do not usually have which of the following characteristics? A. developed on previous hardware (and/or software) platforms B. are easily adaptable to enterprise systems C. have been used by an organization for a long period of time D. all of the above are typical characteristics of legacy systems

58. In a relational database, a relation is defined as a collection of data representing multiple occurrences of the following except: A. a resource B. an event C. an activity D. an agent

59. are defined as a set of data that describes an instance of the entity represented by a relation. A. Attributes B. Tuples C. Primary keys D. Candidate keys

60. specifies that for every attribute value in one relation that has been specified in order to allow reference to another relation, the tuple being referenced must remain intact. A. Cardinality constraint B. Participation constraint C. Referential integrity D. Economic constraint

61. Which of following is not a step in the process for specifying relations based on REA diagrams? A. Determine the attributes for each of the entities. B. Determine the number of tables. C. Create a separate relational table for each entity. D. Implement the relationships among the entities.


62. A situation in which a particular supplier provides more than one type of inventory item to a firm and a particular type of inventory item is acquired from more than a single supplier is called a(n): A. one-to-one relationship B. one-to-many relationship C. many-to-many relationship D. entity relationship

63. The following E-R diagram shows a M:N relationship between two relations. To map this E-R diagram into a logical database model:

A. divide the content of the Course relation to establish two relations having 1:N relationships B. add the primary key of the Student relation as an attribute in the Course relation C. create a new relation whose primary key is a composite of the primary keys of two relations D. add the primary key of the Course relation as an attribute in the Student relation

64. Which of the following is not a proper SQL command for creating database relations? A. Create table employee B. Create table training_completed C. Create client D. Alter table release_time

65. A simplified representation of a complex entity is a(n): A. instance B. attribute C. model D. relationship

66. Which of the following relational commands would a manager use to combine the data from two related relations into a third relation? A. Select B. Project C. Join D. Display


67. In a relational database, the entity is represented as a(n): A. Table B. Network C. Field D. Attribute

68. Which is not a step in creating a relation using SQL? A. assign the relation a name B. assign each attribute a name C. specify the constraints on the attributes D. specify the attributes of the constraints

69. Which is not an SQL command in which data can be changed in the database? A. INSERT B. DELETE C. UPDATE D. CREATE

70. Which of the following is a valid SQL command? A. MODIFY B. INSERT C. ADD D. APPEND

71. The SELECT statement has all but one of the following parts: A. a list of attributes that we wish to SELECT from the database B. a WHEN clause C. a list of tables where these attributes can be found D. a WHERE clause


72. Exhibit 6-1 The following table is a view of BILLING_HOURS from the various data elements in High-Tech Corp.'s relational database.

BILLING_HOURS

Employee_No B122 A632 B122 A632 B122 A632

Client_No F26768 F11555 F26768 F11555 F26768 F11555

Date 20010823 20010823 20010824 20010824 20010825 20010825

Hours 8 7 8 6 9 10

Billing_Rate 150 100 150 100 150 100

Refer to Exhibit 6-1. Which of the following SQL statements would extract the employee number and date for every instance that an employee worked more than 8 hours any particular day?

A. SELECT FROM WHERE B. QUERY FROM WHERE C. SELECT WHERE D. QUERY SELECT WHERE

Employee_No, Date BILLING_HOURS Hours>8 Employee_No, Date BILLING_HOURS Hours>8 Employee_No, Date Hours>8 BILLING_HOURS Employee_No, Date Hours>8

73. Exhibit 6-1 The following table is a view of BILLING_HOURS from the various data elements in High-Tech Corp.'s relational database.

BILLING_HOURS

Employee_No B122 A632 B122 A632 B122 A632

Client_No F26768 F11555 F26768 F11555 F26768 F11555

Date 20010823 20010823 20010824 20010824 20010825 20010825

Hours 8 7 8 6 9 10

Billing_Rate 150 100 150 100 150 100


Refer to Exhibit 6-1. Which of the following SQL statements would extract the employee number and date for every instance that had a billing rate of $150?

A. SELECT FROM WHERE B. QUERY FROM WHERE C. SELECT WHERE D. QUERY SELECT WHERE

Employee_No, Date BILLING_HOURS Rate=150 Employee_No, Date BILLING_HOURS Rate=150 Employee_No, Date Rate=150 BILLING_HOURS Employee_No, Date Hours>8

74. Exhibit 6-1 The following table is a view of BILLING_HOURS from the various data elements in High-Tech Corp.'s relational database.

BILLING_HOURS

Employee_No B122 A632 B122 A632 B122 A632

Client_No F26768 F11555 F26768 F11555 F26768 F11555

Date 20010823 20010823 20010824 20010824 20010825 20010825

Hours 8 7 8 6 9 10

Billing_Rate 150 100 150 100 150 100

Refer to Exhibit 6-1. Which of the following SQL statements would extract the client number and date for every instance that had a billing rate of $150?

A. QUERY SELECT WHERE B. QUERY FROM WHERE C. SELECT WHERE D. SELECT FROM WHERE

BILLING_HOURS Client_No, Date Rate=150 Client_No, Date BILLING_HOURS Rate=150 Client_No, Date Rate=150 Client_No, Date BILLING_HOURS Rate=150


75. Exhibit 6-1 The following table is a view of BILLING_HOURS from the various data elements in High-Tech Corp.'s relational database.

BILLING_HOURS

Employee_No B122 A632 B122 A632 B122 A632

Client_No F26768 F11555 F26768 F11555 F26768 F11555

Date 20010823 20010823 20010824 20010824 20010825 20010825

Hours 8 7 8 6 9 10

Billing_Rate 150 100 150 100 150 100

Refer to Exhibit 6-1. Which of the following SQL statements would extract the client number and date for every instance that an employee worked less than 8 hours any particular day?

A. QUERY SELECT WHERE B. QUERY FROM WHERE C. SELECT WHERE D. SELECT FROM WHERE

BILLING_HOURS Client_No, Date Hours<8 Client_No, Date BILLING_HOURS Hours>8 Client_No, Date Hours<8 Client_No, Date BILLING_HOURS Hours<8

76. A(n) agent about which data is collected.

in an accounting system can be classified as a resource, event, or

77. A(n)

is an item of data that characterizes an entity or relationship.

78. Attributes that consist of multiple subattributes are referred to as

79. A(n) that will ever appear in the database.

.

attribute is the attribute whose value is unique for every entity


80. database.

map and define the way in which data can be extracted from a

81. A(n)

relationship occurs between two different instances of an entity.

82. The specifies how many occurrences of an entity can participate in the given relationship with any one occurrence of the other entity in the relationship.

83. The relationship with the other entity.

specifies the degree of minimum participation of one entity in the

84. The notation 1:N is used to specify the relationship type of

85. REA stands for

,

.

and

.

86. queries.

values waste memory space and may cause problems when running

87. A collection of data representing multiple occurrences of a resource, event, or agent is known as a(n) .

88. A set of data that describes a single instance of the entity represented by a relation is known as a(n) .


89. The

is specified to uniquely identity each tuple in the relation.

90. specifies that for every attribute value in one relation that has been specified to allow reference to another relation, the tuple being referenced must be intact.

91. is a powerful database language that can be used to define database systems, query the database for information, generate reports from the database, and access databases from within programs using embedded commands.

92. The

command is used to add new tuples to a relation.

93. The command demonstrates one of the weaknesses in most forms of SQL because the database will not enforce referential integrity.

94. The values for one or more tuples in a table.

95. Queries of a database are driven by

command is used when we want to change one or more attribute

commands.

96. systems have existed in an organization over a long period of time and were developed using an organization's previous computer hardware and software platforms.

97. A(n) links among the tables.

is a primary key that is inserted into other tables to establish


98. uses state-of-the-art information technologies for storing and analyzing data to help managers make the best possible decisions for their companies.

99. A(n)

a simplified representation of a complex entity or phenomenon.

100. A(n) entity.

of an entity is one specific thing of the type defined by the

101. The following table is a view of BILLING_HOURS from the various data elements in ABC's relational database:

BILLING_HOURS

Employee_No B122 A632 B122 A632 B122 A632 B122 A632 A356 A432 A491 B122 A632 A356 B432 B491

Client_No F11555 F11555 F11555 F11555 F11555 F11555 H12456 H12456 F11555 H12456 H12456 F11555 H12456 F11555 H12456 H12456

Date 990823 990823 990824 990824 990825 990825 990826 990826 990826 990826 990826 990827 990827 990827 990827 990827

Hours 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8

Billing_Rate 150 100 150 100 150 100 150 100 57 57 57 150 100 57 57 57

Required: a. Using proper SQL commands, develop a query to extract billing data for Fleet Services (client number F11555), showing the employee number, date, hours, and billing rate. b. Design a table showing the output that would be generated based upon your query created above.


102. The following table is a view of TRAINING_COMPLETED from the various data elements in High-Tech Corp.'s relational database:

TRAINING_COMPLETED

Employee_No 11111 11152 11163 11111 11152 11163 11111 11152 11175 11111 11175 11111 11152 11163 11175

Date 990823 990823 990823 990824 990824 990824 990825 990825 990825 990826 990826 990827 990827 990827 990827

Hours 8 8 8 8 8 8 8 8 8 8 8 8 8 8 8

Train_Code 15 15 45 25 25 15 45 55 45 55 55 65 45 65 65

Required: a. Using proper SQL commands, develop a query to extract training data for employee Missy Pitman (employee number 11111), showing the date, hours, and training code. b. Design a table showing the output that would be generated based upon your query created above.


103. Based on the following abbreviated description of Avery University's course scheduling and student advising procedures, prepare an Entity-Relationship (E-R) diagram that reflects the key entities and relationships. Course Scheduling: In consultation with the vice-president of Academic Affairs and the Registrar's Office, each academic department chair decides which courses will be offered each semester and how many sections of each course will be scheduled. Courses are scheduled in sections meeting at different times over the course of the week. Some courses are scheduled in multiple sections. The department chair also assigns a faculty member who teaches for his/her department to teach each course-section. Students enroll in courses-sections by submitting their schedule selections to the Registrar's Office. In assigning students to sections, the Registrar gives preference to students based on their class standing (i.e., Senior, Junior, Sophomore, and Freshman). Student Advising: Student academic advising is done according to each student's major. Each student chooses a faculty advisor from his/her major department. While each student has only one "official" academic advisor, each faculty person advises several students, up to a maximum of 15 advisees.


Chapter 6--Relational Databases and SQL Key

1. TRUE 2. TRUE 3. FALSE 4. FALSE 5. FALSE 6. FALSE 7. TRUE 8. TRUE 9. TRUE 10. TRUE 11. TRUE 12. FALSE 13. FALSE 14. TRUE 15. FALSE 16. FALSE 17. TRUE 18. FALSE 19. TRUE 20. TRUE 21. FALSE 22. FALSE 23. TRUE 24. FALSE 25. FALSE 26. TRUE 27. TRUE 28. FALSE 29. FALSE


30. TRUE 31. TRUE 32. FALSE 33. TRUE 34. FALSE 35. TRUE 36. C 37. D 38. C 39. A 40. B 41. D 42. D 43. B 44. A 45. B 46. D 47. B 48. C 49. C 50. A 51. C 52. B 53. B 54. D 55. D 56. A 57. B 58. C 59. B 60. C 61. B 62. C 63. C


64. C 65. C 66. A 67. A 68. D 69. D 70. B 71. B 72. A 73. A 74. D 75. D 76. entity 77. attribute 78. composite attributes 79. key 80. Relationships 81. recursive 82. cardinality constraint 83. participation constraint 84. one to many or one-to-many 85. resources, events, agents or resources, agents, events or events, resources, agents or events, agents, resources or agents, resources, events or agents, events, resources 86. Null 87. relation 88. tuple 89. primary key 90. Referential integrity 91. SQL 92. INSERT 93. DELETE 94. UPDATE 95. SELECT 96. Legacy 97. foreign key


98. Business intelligence or Business intelligence (BI) or BI 99. model 100. instance 101. a.

SELECT

FROM

WHERE

b.

102. a.

Employee_No B122 A632 B122 A632 B122 A632 A356 B122 A356

Date 990823 990823 990824 990824 990825 990825 990826 990827 990827

SELECT

Date, Hours, Train_Code TRAINING_CO MPLETED Employee_No='1 1111'

FROM WHERE

b.

Employe e_No, Date, Hours, Billing_ Rate BILLIN G_HOU RS Client_ No='F11 555'

Date 990823 990824 990825 990826 990827

Hours 8 8 8 8 8

Hours 8 8 8 8 8 8 8 8 8

Billing_Rate 150.00 100.00 150.00 100.00 150.00 100.00 57.00 150.00 57.00

Train_Code 15 25 45 55 65


103. See Figure TB-6.1


Chapter 7--Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control Student: 1. Organizational governance is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance. True False

2. Fraud is the possibility that an event or action will cause an organization to fail to meet its objectives (or goals). True False

3. Management is responsible for establishing and maintaining an adequate system of internal control. True False

4. A major reason management must exercise control over an organization's business processes is to provide reasonable assurance that the company is in compliance with applicable laws and regulations. True False

5. Expected gross risk is a function of the initial expected gross risk, reduced risk exposure due to controls, and cost of controls. True False

6. Under the Sarbanes Oxley Act of 2002, the section on Auditor Independence establishes an independent board to oversee public company audits. True False

7. Under the Sarbanes Oxley Act of 2002, the section on Corporate Responsibility requires a company's CEO and CFO to certify quarterly and annual reports. True False


8. Under the Sarbanes Oxley Act of 2002, the section on Enhanced Financial Disclosures requires each annual report filed with the SEC to include an internal control report. True False

9. Under the Sarbanes Oxley Act of 2002, the section on Corporate Tax Returns conveys a sense of the Senate that the corporate federal income tax returns be signed by the treasurer. True False

10. Management's legal responsibility to prevent fraud and other irregularities is implied by laws such as the Foreign Corrupt Practices Act. True False

11. Risks are those events that could have a negative impact on organization objectives. True False

12. Opportunities are events that could have a positive impact on organization objectives. True False

13. Risk assessment is the entity's identification and analysis of relevant risks to the achievement of its objectives, forming a basis for determining how the risks should be managed. True False

14. The control environment reflects the organization's general awareness of and commitment to the importance of control throughout the organization. True False

15. External directives are the policies and procedures that help ensure that management directives are carried out. True False

16. Establishing and maintaining a viable internal control system is the responsibility of management. True False


17. Monitoring is a process that assesses the quality of internal control performance over time. True False

18. The external environment is a system of integrated elements¾people, structures, processes, and procedures¾acting together to provide reasonable assurance that an organization achieves both its operations system and its information system goals. True False

19. A fraud is a deliberate act or untruth intended to obtain unfair or unlawful gain. True False

20. SAS No. 99 emphasizes auditors should brainstorm fraud risks, increase professional skepticism, use unpredictable audit test patterns, and detect management override of internal controls. True False

21. According to the 2008 Report to the Nation on Occupational Fraud and Abuse, frauds are more likely to be detected by audits or internal controls than through tips. True False

22. A computer crime technique called worm involves the systematic theft of very small amounts from a number of bank or other financial accounts. True False

23. A computer abuse technique called a back door involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program. True False

24. A logic bomb is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, may cause a disaster such as shutting down a system or destroying data. True False


25. Salami slicing is program code that can attach itself to other programs (i.e., "infect" those programs), that can reproduce itself, and that operates to alter the programs or to destroy data. True False

26. Ethical behavior and management integrity are products of the "corporate culture". True False

27. The control matrix is a computer virus that takes control of the computer's operating system for malicious purposes. True False

28. The control goal called efficiency of operations strives to assure that a given operations system is fulfilling the purpose(s) for which it was intended. True False

29. Ensuring the security of resources is the control goal that seeks to provide protection of organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources. True False

30. The control goal of ensuring input materiality strives to prevent fictitious items from entering an information system. True False

31. Valid input data are appropriately authorized and represent actual economic events and objects. True False

32. The control goal of input accuracy is concerned with the correctness of the transaction data that are entered into a system. True False

33. Business process control plans relate to those controls particular to a specific process or subsystem, such as billing or cash receipts. True False


34. A sale to a customer is entered into the system properly, but the event does not accurately update the customer's outstanding balance. This type of processing error would be classified as a user error. True False

35. A batch of business events is accurately entered into a business event data store, but the computer operator fails to use the data to update master data. This type of processing error would be classified as an operational error. True False

36. A corrective control plan is designed to discover problems that have occurred. True False

37. A process by which organizations select objectives, establish processes to achieve objectives, and monitor performance is: A. enterprise risk management B. internal control C. organizational governance D. risk assessment

38. A process, effected by an entity's board of directors, management and other personnel, applied in strategy settings and across the enterprise, designed to identify potential events that may effect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives is: A. enterprise risk management B. internal control C. organizational governance D. risk assessment

39. A manager of a manufacturing plant alters production reports to provide the corporate office with an inflated perception of the plant's cost effectiveness in an effort to keep the inefficient plant from being closed. This action would be classified as a(n): A. risk B. hazard C. fraud D. exposure


40. The ERM framework addresses four categories of management objectives. Which category concerns high-level goals, aligned with and supporting its mission? A. Compliance B. Operations C. Reporting D. Strategic

41. The ERM framework addresses four categories of management objectives. Which category addresses the effective and efficient use of resources? A. compliance B. operations C. reporting D. strategic

42. The ERM framework addresses four categories of management objectives. Which category addresses the reliability of the financial statements? A. compliance B. operations C. reporting D. strategic

43. The ERM framework addresses four categories of management objectives. Which category of concerns laws and regulations? A. compliance B. operations C. reporting D. strategic

44. The ERM framework is comprised of eight components. Which component includes the policies and procedures established and implemented to help ensure the risk responses are effectively carried out? A. control activities B. event identification C. risk assessment D. risk response


45. Risk assessment is best described by: A. Internal and external events affecting achievement of an entity's objectives must be identified, distinguishing between risks and opportunities. B. Management selects whether to avoid, accept, reduce, or share risk - developing a set of actions to align risks with the entity's risk tolerances and risk appetite. C. The entirety of enterprise risk management is monitored and modifications made as necessary. D. The likelihood and impact of risks are analyzed, as a basis for determining how they should be managed.

46. Which component of the ERM framework is best described here: Management selects whether to avoid, accept, reduce, or share risk - developing a set of actions to align risks with the entity's risk tolerances and risk appetite. A. control activities B. event identification C. risk assessment D. risk response

47. Which component of the ERM framework is best described here: Internal and external events affecting achievement of an entity's objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management's strategy or objective-setting processes. A. control activities B. event identification C. risk assessment D. risk response

48. This component of the ERM framework that encompasses the tone of an organization and sets the basis for how risk is viewed and addressed by an entity's people, including risk management philosophy and risk appetite, integrity and ethical values and the environment in which they operate A. control activities B. internal environment C. risk assessment D. risk response

49. This component of the ERM framework concerns the entirety of enterprise risk management and is accomplished through ongoing management activities, separate evaluations, or both. A. control activities B. monitoring C. objective setting D. risk response


50. Approvals, authorizations, verifications, reconciliations, reviews of operating performance, security procedures, supervision, audit trails, and segregation of duties are examples of: A. control activities B. event identification C. monitoring D. risk response

51. Events that could have a negative impact on organizational objectives: A. Controls B. embezzlement C. Fraud D. Risks

52. Events that could have a positive impact on organizational objectives: A. Controls B. Fraud C. Opportunities D. Profit

53. Who is legally responsible for establishing and maintaining an adequate system of internal control? A. the board of directors B. stakeholders C. investors D. management

54. The major reasons for exercising control of the organization's business processes include: A. to provide reasonable assurance that the goals of the business are being achieved B. to mitigate risks of fraud and other intentional and unintentional acts C. to provide reasonable assurance that the company is in compliance with applicable legal and regulatory obligations D. all of the above

55. The effect of an event's occurrence is: A. control B. impact C. risk D. opportunity


56. The section of Sarbanes Oxley that establishes an independent board to oversee public company audits is: A. Title I - Public Company Accounting Oversight Board B. Title II - Auditor Independence C. Title III - Corporate Responsibility D. Title IV - Enhanced Financial Disclosures

57. The section of Sarbanes Oxley that prohibits a CPA firm that audits a public company from engaging in certain nonaudit services with the same client is: A. Title I - Public Company Accounting Oversight Board B. Title II - Auditor Independence C. Title III - Corporate Responsibility D. Title IV - Enhanced Financial Disclosures

58. The section of Sarbanes Oxley that requires a company's CEO and CFO to certify quarterly and annual reports is: A. Title I - Public Company Accounting Oversight Board B. Title II - Auditor Independence C. Title III - Corporate Responsibility D. Title IV - Enhanced Financial Disclosures

59. The section of Sarbanes Oxley that requires each annual report filed with the SEC to include an internal control report is: A. Title I - Public Company Accounting Oversight Board B. Title II - Auditor Independence C. Title III - Corporate Responsibility D. Title IV - Enhanced Financial Disclosures

60. The section of Sarbanes Oxley that requires financial analysts to properly disclose in research reports any conflicts of interest they might hold with the companies they recommend is: A. Title V - Analysts Conflicts of Interests B. Title VIII - Corporate and Criminal Fraud Accountability C. Title IX - White-Collar Crime Penalty Enhancements D. Title XI - Corporate Fraud and Accountability


61. The section of Sarbanes Oxley that makes it a felony to knowingly destroy, alter, or create records and or documents with the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation and offers legal protection to whistle blowers is: A. Title V - Analysts Conflicts of Interests B. Title VIII - Corporate and Criminal Fraud Accountability C. Title IX - White-Collar Crime Penalty Enhancements D. Title XI - Corporate Fraud and Accountability

62. The section of Sarbanes Oxley that sets forth criminal penalties applicable to CEOs and CFOs of up to $5 million and up to 20 years imprisonment if they knowingly or willfully certify false or misleading information contained in periodic reports is: A. Title V - Analysts Conflicts of Interests B. Title VIII - Corporate and Criminal Fraud Accountability C. Title IX - White-Collar Crime Penalty Enhancements D. Title XI - Corporate Fraud and Accountability

63. The section of Sarbanes Oxley that provides for fines and imprisonment of up to 20 years to individuals who corruptly alter, destroy, mutilate, or conceal documents with the intent to impair the document's integrity or availability for use in an official proceeding, or to otherwise obstruct, influence or impede any official proceeding is: A. Title V - Analysts Conflicts of Interests B. Title VIII - Corporate and Criminal Fraud Accountability C. Title IX - White-Collar Crime Penalty Enhancements D. Title XI - Corporate Fraud and Accountability

64. Which of the following is not a requirement of SOX Section 404? A. Evaluate the design of the company's controls to determine if they adequately address the risk that a material misstatement of the financial statements would not be prevented or detected in a timely manner. B. Gather and evaluate evidence about the operation of controls. C. Implement key controls to determine their operating efficiency. D. Present a written assessment of the effectiveness of internal control over financial reporting.

65. This framework was issued in 1996 (and updated in 2007) by the Information Systems Audit and Control Association (ISACA) because of the influence of IT over information systems, financial reporting and auditing. A. COBIT B. COSO C. ERM D. All of the above.


66. As described in COSO, elements of a control environment might include the following: A. commitment to the importance of control B. reward systems C. tone at the top of the organization D. all of the above

67. are the policies and procedures that help ensure that the risk responses are effectively carried out. A. Control environment B. Risk assessment C. Control activities D. Monitoring

68. is a process that evaluates the quality of internal control performance over time. A. Control environment B. Risk assessment C. Control activities D. Monitoring

69. Which of the following statements regarding a system of internal control is false? A. Effective internal control systems provide complete assurance against the occurrence of material frauds and embezzlements. B. Internal control systems depend largely on the competency and honesty of people. C. Because internal control systems have a cost, management should evaluate the cost/benefit of each control plan. D. The development of an internal control system is the responsibility of management.

70. sets the tone of the organization, influencing the control consciousness of its people. A. Control environment B. Risk assessment C. Control activities D. Monitoring

71. According to the 2008 Report to the Nation on Occupational Fraud and Abuse, frauds are more likely to be detected by: A. audits B. internal controls C. managers D. tips


72. A deliberate act or untruth intended to obtain unfair or unlawful gain is a(n): A. audit B. embezzlement C. fraud D. theft

73. A computer abuse technique called a involves inserting unauthorized code in a program, which, when activated, may cause a disaster, such as shutting the system down or destroying files. A. salami slicing B. back door C. logic bomb D. Trojan horse

74. A computer abuse technique called a across networks. A. worm B. back door C. logic bomb D. Trojan horse

involves a virus that replicates itself on disks, in memory, or

75. A(n) is a computer abuse technique where unauthorized instructions are inserted into a program to systematically steal very small amounts, usually by rounding to the nearest cent in financial transactions. A. worm B. salami slicing C. logic bomb D. Trojan horse

76. A control goal that is a measure of success in meeting a set of established goals is called: A. effectiveness B. Monitoring C. Efficiency D. Risk

77. Establishing a viable internal control system is primarily the responsibility of: A. the external auditors B. management C. programmers D. government authorities


78. As a result of an inadequate design, a production process yields an abnormally high amount of raw material scrapped. Which control goal is being violated? A. ensure effectiveness of operations B. ensure efficient employment of resources C. ensure security of resources D. ensure input accuracy

79. The information process control goal which relates to preventing fictitious events from being recorded is termed: A. ensure input validity B. ensure input accuracy C. ensure input completeness D. ensure effectiveness of operations

80. A business event which is not properly authorized is an example of: A. an invalid item B. an inaccurate item C. an incomplete item D. an unusual item

81. Achieving which control goal requires that all valid objects or events are captured and entered into a system's database once and only once? A. ensure input validity B. ensure update accuracy C. ensure input completeness D. ensure update completeness

82. Failing to record a customer's order for the purchase of inventory violates the control goal of: A. ensure input accuracy B. ensure input completeness C. ensure input validity D. ensure input accuracy and input validity

83. Discrepancies between data items recorded by a system and the underlying economic events or objects they represent are a violation of the control goal of: A. ensure input validity B. ensure input completeness C. ensure input accuracy D. ensure update completeness


84. Assuring that the accounts receivable master data reflects all cash collections recorded in the cash receipts event data addresses the control goal of: A. ensure input accuracy B. ensure input completeness C. ensure update accuracy D. ensure update completeness

85. Assuring that cash collections recorded in the cash receipts event data are credited to the right customer in the accounts receivable master data addresses the control goal of: A. ensure input accuracy B. ensure input completeness C. ensure update accuracy D. ensure update completeness

86. Which of the following is a control goal regarding master data? A. ensure input validity B. ensure update accuracy C. ensure input accuracy D. ensure input completeness

87. Why is there usually no control goal called update validity? A. Input and update completeness achieve update validity. B. Input validity guarantees update validity. C. Update accuracy guarantees update validity. D. Input accuracy achieves update validity.

88. A programming error causes the sale of an inventory item to be added to the quantity on hand attribute in the inventory master data. Which control goal was not achieved? A. ensure update completeness B. ensure input accuracy C. ensure update accuracy D. ensure input completeness

89. The business process objectives that an internal control system is designed to achieve are: A. control goals B. control plans C. general controls D. the control matrix


90. These are applied to all IT service activities. A. control goals B. control plans C. IT general controls D. the control matrix

91. A tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans is: A. ERM B. control plans C. control matrix D. internal controls

92. Information-processing policies and procedures that assist in accomplishing control goals are known as: A. control plans B. control systems C. control objectives D. control outcomes

93. relate to a specific AIS process, such as billing or cash receipts. A. Control procedures B. Information processing procedures C. Business process control plans D. Operations system control plans

94. Control plans that relate to a multitude of goals and processes are called: A. business process control plans B. internal control systems C. pervasive control plans D. management control systems

95. Control goals of operations processes include: A. validity B. the control environment C. accuracy D. security of resources


96. Controls that stop problems from occurring are called: A. preventive controls B. detective controls C. corrective controls D. programmed controls

97. A control that involves reprocessing transactions that are rejected during initial processing is an example of: A. preventive controls B. detective controls C. corrective controls D. programmed controls

98. A process captures only authorized transactions but fails to record them only once. Which control goal does this fail to achieve? A. Validity B. Accuracy C. Completeness D. Effectiveness

99. The correct sequence of the control hierarchy, from top to bottom, is: A. control environment, IT general controls, pervasive controls, business process controls B. business process controls, IT general controls, pervasive controls, control environment C. control environment, pervasive controls, IT general controls, business process controls D. business process controls, control environment, pervasive controls, IT general controls

100. is a process, effected by an entity's board of directors, management and other personnel, applied in strategy settings and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.

101. is a process by which organizations select objectives, establish processes to achieve objectives, and monitor performance.

102.

is the possibility that an event will occur.


103. gain.

is a deliberate act or untruth intended to obtain unfair or unlawful

104. objectives.

are those events that would have a negative impact on organization

105.

are events that would have a positive impact on objectives.

106. The states that "a fundamental aspect of management's stewardship responsibility is to provide shareholders with reasonable assurance that the business is adequately controlled."

107. The section of Sarbanes Oxley that establishes an independent board to oversee public company audits is .

108. The section of Sarbanes Oxley that has received the most press as companies and their auditors have struggled to comply with its requirements is .

109. The section of Sarbanes Oxley that prohibits audit firms from providing a wide array of nonaudit services to audit clients is .

110. The section of Sarbanes Oxley that requires a company's CEO and CFO to certify quarterly and annual reports is .


111. The section of Sarbanes Oxley that requires each annual report filed with the SEC to include an internal control report is .

112. The section of Sarbanes Oxley that requires financial analysts to properly disclose in research reports any conflicts of interest they might hold with the companies they recommend is .

113. The section of Sarbanes Oxley that authorizes the SEC to censure or deny any person the privilege of appearing or practicing before the SEC if that person is deemed to be unqualified, have acted in an unethical manner, or have aided and abetted in the violation of federal securities laws is .

114. The section of Sarbanes Oxley that makes it a felony to knowingly destroy, alter, or create records and or documents with the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation and offers legal protection to whistle-blowers is .

115. The section of Sarbanes Oxley that sets forth criminal penalties applicable to CEOs and CFOs of up to $5 million and up to 20 years imprisonment if they knowingly or willfully certify false or misleading periodic reports is .

116. The section of Sarbanes Oxley that provides for fines and imprisonment of up to 20 years for individuals who corruptly alter, destroy, mutilate, or conceal documents with the intent to impair the document's integrity or availability for use in an official proceeding, or to otherwise obstruct, influence or impede any official proceeding is .

117. provides guidance on how an organization's IT might affect any of COSO's five components of internal control. This standard guides auditors in understanding the impact of IT on internal control and assessing IT-related control risks.


118. PCAOB Auditing Standard No. 5 uses conduct of an integrated audit under SOX 404.

in its description of the

119. The framework suggests that organizations and auditors should continue to use COSO as a basis for internal control.

120. COSO's is the entity's identification and analysis of relevant risks to the achievement of its objectives, forming a basis for determining how the risks should be managed.

121. COSO's consciousness of its people.

sets the tone of the organization, influencing the control

122. COSO's management directives are carried out.

are the policies and procedures that help ensure that

123. Establishing a viable internal control system is the responsibility of

124. COSO's performance over time.

125. desirable result.

.

is a process that assesses the quality of internal control

is a series of actions or operations leading to a particular and usually


126. is a process¾effected by an entity's board of directors, management, and other personnel¾designed to provide reasonable assurance regarding the achievement of objectives such as: effectiveness and efficiency of operations, reliability of reporting, and compliance with applicable laws and regulations.

127. COSO's control, providing discipline and structure.

128. means used to commit the crime.

is the foundation for all other components of internal

includes crime in which the computer is the target of the crime or the

129. A computer crime technique called involves the systematic theft of very small amounts usually by rounding to the nearest cent in financial transactions such as the calculation of interest on savings accounts.

130. A computer abuse technique called replicates itself on disks, in memory, and across networks.

involves a program that

131. A computer abuse technique called involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.

132. A(n) is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data.


133. A(n) is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.

134. A(n) is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans.

135. designed to achieve.

are business process objectives that an internal control system is

136. The control goal called ensure or more goals for the operations process.

is a measure of success in meting one

137. The control goal called ensure resources applied to achieve a set of goals.

is a measure of the productivity of

138. The control goal that seeks to protect an organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources is called ensure .

139. The control goal of ensure entering an information system.

140. A(n) or is otherwise not genuine.

strives to prevent fictitious items from

item is an object or event that is not authorized, never occurred,


141. The control goal that is concerned with the correctness of the transaction data that are entered into a system is called ensure .

142. A missing data field on a source document or computer screen is an example of an error that could undermine the achievement of the control goal of ensure .

143. The control goal of ensure provides assurance that all valid objects or events which were entered into the computer are in turn reflected in their respective master data once and only once.

144. The control goal of ensure provides assurance that objects or events which were entered into the computer are in reflected correctly in their respective master data.

145. The control goal of ensure captured and entered into the computer once and only once.

requires that all valid objects or events are

146. Information-processing policies and procedures that assist in accomplishing control goals are known as .

147. A(n) receipts.

148.

relates to a specific AIS process, such as billing or cash

are applied to all IT service activities.


149. programs.

are automated business process controls contained within computer

150. Control plans that relate to a multitude of goals and processes are called .

151. systems.

is software designed specifically to damage or disrupt computer

152. A(n) is program code that can attach itself to other programs or macros thereby infecting those programs and macros.

153. Three terms used in the chapter to refer to when a control plan is exercised are , , and corrective control plans.

154. A(n) occurred.

control plan is designed to discover problems that have

155. A(n)

control plan is designed to rectify problems that have occurred.


156. Below is a list of sources of information and guidance on internal controls. The second list contains descriptions or information provided by these sources. Required: On the blank line to the left of each numbered item, place the capital letter of the source that best matches that description. HINT: Some letters may be used more than once. Conversely, some letters may not apply at all.

Sources of Informati on and Guidance on Internal Controls A. Enterprise Risk Management (ERM) Framework B. Foreign Corrupt Practices Act C. PCAOB Auditing Standard No. 5 D. Sarbanes-Oxley Act Section 201 E. Sarbanes-Oxley Act Section 404 F. Statement on Auditing Standards No. 94 G Internal Control¾Integrated Framework (COSO)

Answers

Descripti ons of Informati on and Guidance Provided by the Sources 1.

A fundamental aspect of management's stewardship responsibility is to provide shareholders with reasonable assurance that the business is adequately controlled.

2.

This was developed to help management identify, assess and manage risk.

3.

This addressed four categories of management objectives: strategic, operations, reporting and compliance.

4.

This prohibits a CPA firm that audits a public company to engage in certain nonaudit services with the same client.

5.

Provides guidance for conducting an integrated audit of financial statements under Sarbanes-Oxley Act Section 404.

6.

This provides guidance on how an organization's IT might affect any of COSO's five components of internal control.

7.

This requires each annual report filed with the SEC to include an internal control report.

8.

Reduced the requirements laid out in Sarbanes-Oxley Act Section 404.

9.

States that COSO is a suitable framework for an assessment of internal control.

10.

The definition of internal control in this document has been adopted throughout the world.


157. Below is a list of control goals followed by a list of short scenarios describing system failures (i.e., control goals not met) and/or instances of successful control plans (i.e., plans that helped to achieve control goals). Required: On the blank line to the left of each numbered scenario, place the capital letter of the control goal that best matches the situation described. HINT: Some letters may be used more than once. Conversely, some letters may not apply at all.

Control Goals A. B. C. D.

Answers

Ensure effectiveness of operations. Ensure efficient employment of resources. Ensure security of resources. Ensure input validity.

E. F. G. H.

Ensure input accuracy. Ensure input completeness. Ensure update accuracy. Ensure update completeness.

SCENAR IOS 1.

A batch of documents sent by the mail room to the accounts receivable department were lost in the intercompany mail and never recorded.

2.

A flaw in the processing logic of a computer program resulted in cash received from customers being added to their accounts receivable balances rather than subtracted.

3.

A mail room clerk fabricated a phony document for a friend to make it look like the friend had paid his account receivable balance. The phony document got recorded.

4.

An accounts receivable clerk made a copy of the company's accounts receivable master data and sold this customer information to a competing company.

5.

Customer checks received in the mail room are batched and sent to the cashier several times a day so that they can be deposited as fast as possible.

6.

In a manual bookkeeping system, an accounts receivable clerk failed to post an entire page of transactions from the cash receipts journal to the accounts receivable subsidiary ledger.

7.

In a manual bookkeeping system, cash receipts recorded correctly in the cash receipts journal but some were inadvertently posted to the wrong customer accounts.

8.

In keying remittance advices into his computer terminal, an accounts receivable clerk entered a receipt of $200 as $2,000.

9.

The cost of the people and computers needed to process incoming checks is less than the benefit obtained from the incoming funds.

10.

The company's accounts receivable system was infiltrated by a hacker.



158. Figure TB-7.1 depicts the objective setting process shown in Chapter 7 but with all labels removed. Required: Complete Figure TB-7.1 by inserting the following labels where they belong in the model:

Box Title

A.

Related objectives

E.

B.

Strategy

F.

C.

Mission, vision, purpose

G.

D.

Strategic objectives

H.

Box Descri ption e.g., to be in the top quartile of product sales for retailer s of our product s e.g., to be the leading produc er of househ old product s in the regions in which we operate · increase production of x by 15% · hire 180 qualified new staff · maintain product quality e.g., expand product ion of our top-fiv e selling retail product s to meet increas ed deman d



159. Listed below are 13 specific fraud examples taken from some well-known fraud cases: MiniScribe, ZZZZ Best Carpet Cleaning, Lesley Fay, and Equity Funding. Required: For each fraud example, enter a letter corresponding to which information control goal was initially violated¾Validity, Completeness, or Accuracy. Some examples might involve more than one violation. NOTE: When we say initially, we mean what control goal failure led to this example, not what is the present condition. For example, master data might contain information that is inaccurate, but it might have been an inaccurate input that initially caused the data to be inaccurate.

Fraud Examples: Control Goal Initially Violated 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

Scenario MiniScribe: Sales were inflated by shipping disk drives that were not ordered by customers. MiniScribe: Sales of goods were recorded prior to the passing of title. MiniScribe: Some sales returns were never recorded. MiniScribe: Defective disk drives were included in inventory. MiniScribe: Auditors' work papers were altered to inflate inventory values. ZZZZ Best Carpet Cleaning: Phony receivable/sales documents were created to overstate sales. ZZZZ Best Carpet Cleaning: Payments were recorded to fictitious vendors. Lesley Fay Cos.: Inventory was overstated, thereby understating cost of goods sold. Lesley Fay: Markdown allowances to retailers were understated or omitted. Lesley Fay: Suppliers' invoices were not recorded. Lesley Fay: Revenues and profits were inflated by recording sales entries for several days after a quarter had ended. Equity Funding: 63,000 bogus insurance policies were created and recorded. Other: A bank teller stole $1.5 million by pocketing customer deposits. He covered his theft by accessing an unsecured computer terminal and transferring funds from dormant bank accounts into the accounts of customers from whom he had received deposits.


160. The CFO of Exeter Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions. Specifically, Exeter is heavily involved with e-business and its internal information systems are tightly interlinked with its key customers' systems. The CFO has estimated that every hour of system downtime will cost the company about $5,000 in sales. The CFO and CIO have further estimated that if the system were to fail, the average downtime would be about 2 hours per incident. They have anticipated (assume with 100% annual probability) that Exeter will likely experience 10 downtime incidents in a given year due to internal computer system problems, and another 10 incidents per year due to external problems; specifically system failures with the Internet service provider (ISP). Currently, Exeter pays an annualized cost of $25,000 for redundant computer and communication systems, and another $25,000 for Internet service provider (ISP) support just to keep total expected number of incidents to 20 per year. Required: a. b.

Given the information provided thus far, how much ($) is the company's current expected gross risk? A further preventative control would be to purchase and maintain more redundant computers and communication lines where possible, at an annualized cost of $30,000, which would reduce the expected number of downtimes per year to 5 per year due to internal computer system problems. What would the dollar amount of Exeter's current residual expected risk at this point?

161. Listed below are 8 descriptions of sections of the Sarbanes-Oxley Act of 2002 (SOX) followed by the names of 8 sections of SOX. Required: On the blank line next to the numbered section description enter a letter of the corresponding section name.

Section Titles A. B. C. D. E. F. G. H.

Public Company Accounting Oversight Board Auditor Independence Corporate Responsibility Enhanced Financial Disclosures Analysts Conflicts of Interest Studies and Reports Corporate and Criminal Fraud Accountability Corporate Tax Returns


Answers

Section Descripti ons 1.

Section makes it a felony to knowingly destroy, alter, or create records or documents with the intent to impede, obstruct, or influence an ongoing or contemplated federal investigation and provides legal protection for whistle-blowers.

2.

Section prohibits a CPA firm that audits a public company to engage in certain nonaudit services with the same client.

3.

Corporate federal income tax returns should be signed by the CEO.

4.

Section requires each annual report filed with the SEC to include an internal control report.

5.

Section that requires the company's CEO and CFO to certify quarterly and annual report.

6.

Section requires financial analysts to properly disclose in research reports any conflicts of interest they might hold with the companies they recommend.

7.

Section establishes an independent board to oversee public company audits.

8.

Section authorizes the General Accounting Office (GAO) to study the consolidation of public accounting firms since 1989 and offer solutions to any recognized problems.


Chapter 7--Controlling Information Systems: Introduction to Enterprise Risk Management and Internal Control Key

1. TRUE 2. FALSE 3. TRUE 4. TRUE 5. FALSE 6. FALSE 7. TRUE 8. TRUE 9. FALSE 10. TRUE 11. TRUE 12. TRUE 13. TRUE 14. TRUE 15. FALSE 16. TRUE 17. TRUE 18. FALSE 19. TRUE 20. TRUE 21. FALSE 22. FALSE 23. TRUE 24. TRUE 25. FALSE 26. TRUE 27. FALSE 28. FALSE


29. TRUE 30. FALSE 31. TRUE 32. TRUE 33. TRUE 34. FALSE 35. TRUE 36. FALSE 37. C 38. A 39. C 40. D 41. B 42. C 43. A 44. A 45. D 46. D 47. B 48. B 49. B 50. A 51. D 52. C 53. D 54. D 55. B 56. A 57. B 58. C 59. D 60. A 61. B 62. C


63. D 64. C 65. A 66. D 67. C 68. D 69. A 70. A 71. D 72. C 73. C 74. A 75. B 76. A 77. B 78. B 79. A 80. A 81. C 82. B 83. C 84. D 85. C 86. B 87. A 88. C 89. A 90. C 91. C 92. A 93. C 94. C 95. D 96. A


97. C 98. C 99. C 100. Enterprise Risk Management or Enterprise Risk Management (ERM) or ERM 101. Organizational governance 102. Likelihood 103. Fraud 104. Risks 105. Opportunities 106. Foreign Corrupt Practices Act 107. Public Company Accounting Oversight Board, Section 101 or Public Company Accounting Oversight Board or Section 101 108. Enhanced Financial Disclosures, Section 404 or Enhanced Financial Disclosures or Section 404 109. Auditor Independence, Section 201 or Auditor Independence or Section 201 110. Corporate Responsibility, Section 302 or Corporate Responsibility or Section 302 111. Enhanced Financial Disclosures, Section 404 or Enhanced Financial Disclosures or Section 404 112. Title V, Analysts Conflicts of Interests or Analysts Conflicts of Interests or Title V 113. Commission Resources and Authority, Section 602 or Commission Resources and Authority or Section 602 114. Corporate and Criminal Fraud Accountability, Section 802 or Corporate and Criminal Fraud Accountability or Section 602 115. White Collar Crime Penalty Enhancements, Section 906 or White Collar Crime Penalty Enhancements or Section 906 116. Corporate Fraud and Accountability, Section 1102 or Corporate Fraud and Accountability or Section 1102 117. Statement on Auditing Standards No. 94 (SAS 94) or Statement on Auditing Standards No. 94 or SAS 94 118. COSO 119. Enterprise Risk Management (ERM) or Enterprise Risk Management or ERM 120. risk assessment 121. control environment 122. control activities 123. management 124. monitoring 125. Process 126. Internal control 127. control environment 128. Computer crime 129. salami slicing 130. worm


131. back door 132. logic bomb 133. zombie 134. control matrix 135. Control goals 136. effectiveness of operations or effectiveness 137. ensure efficient employment of resources 138. security of resources or security 139. input validity 140. invalid 141. input accuracy 142. input accuracy 143. update completeness 144. update accuracy 145. input completeness 146. control plans 147. business process control plan 148. IT general controls 149. Application controls 150. pervasive control plans 151. Malware 152. computer virus or virus 153. preventive, detective or detective, preventive 154. detective 155. corrective 156. Descriptions 1 2 3 4 5 6 7 8 9 10

Answer B A A D C F E C C G


157. Scenario Number 1 2 3 4 5

Answer F G D C A

Scenario Number 6 7 8 9 10

Answer H G E B C

158. 159. Control Goal Initially Violated V A or V C V or A V or A V V V or A A or C C A or V V V

Scenario 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

160. a. b.

161. 1. 2. 3. 4.

$5,000 ´ 2 hours = $10,000 per incident. $10,000 per incident ´ 20 incidents ´ 100% probability = $200,000 for expected gross risk. Expected gross risk $200,000 - (5 less internal incidents ´ $10,000) = $150,000 plus add the cost of the additional computers and communication lines of $30,000 = $180,000 residual expected risk.

g b h d

5. 6. 7. 8.

c e a f


Chapter 8--Controlling Information Systems: Introduction to Pervasive Controls Student: 1. IT governance is a process that ensures that the organization's IT sustains and extends the organization's strategies and objectives. True False

2. According to COBIT, IT resources include applications, information, infrastructure, and people. True False

3. According to COBIT, IT resources must be managed by IT control processes to ensure that an organization has the information it needs to achieve its objectives. True False

4. The system of controls used in this text consists of the control environment, pervasive control plans, IT general controls, and business process and application control plans. True False

5. The information systems function is synonymous with the accounting function. True False

6. The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or the IT department is the information systems organization. True False

7. The IS function with the responsibility of guiding the IT organization in establishing and meeting user information requirements is the IT steering committee. True False


8. The IS function with the principal responsibilities of ensuring the security of all IT resources is data control. True False

9. The IS function of quality assurance conducts reviews to ensure the attainment of IT objectives. True False

10. The chief information officer (CIO) prioritizes and selects IT projects and resources. True False

11. Within the data center, the data control group is responsible for routing all work into and out of the data center, correcting errors, and monitoring error correction. True False

12. The systems development function provides efficient and effective operation of the computer equipment. True False

13. Within the data center, the data librarian function grants access to programs, data, and documentation. True False

14. Combining the functions of authorizing and executing events is a violation of the organizational control plan known as segregation of duties. True False

15. Segregation of duties consists of separating the four functions of authorizing events, executing events, recording events, and safeguarding the resources resulting from consummating the events. True False

16. Embezzlement is a fraud committed by two or more individuals or departments. True False


17. A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called resource controls. True False

18. The functions of the security officer commonly include assigning passwords and working with human resources to ensure proper interview practices are conducted during the hiring process. True False

19. Individual departments coordinate the organizational and IT strategic planning processes and reviews and approves the strategic IT plan. True False

20. The policy of requiring an employee to alternate jobs periodically is known as forced vacations. True False

21. Forced vacations is a policy of requiring an employee to take leave from the job and substitute another employee in his or her place. True False

22. A fidelity bond indemnifies a company in case it suffers losses from defalcations committed by its employees. True False

23. The WebTrust family of services offers best practices and e-business solutions related exclusively to B2B electronic commerce. True False

24. Data encryption is a process that codes data to make it readable to human eye. True False

25. Systems documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports. True False


26. Program documentation provides a description of an application program and usually includes the program's purpose, program flowcharts, and source code listings. True False

27. The user manual gives detailed instructions to computer operators and to data control about a particular application. True False

28. The operations run manual describes user procedures for an application and assists the user in preparing inputs and using outputs. True False

29. Training materials help users learn their jobs and perform consistently in those jobs. True False

30. Program change controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented. True False

31. Business continuity planning is the process that identifies events that may threaten an organization and provide a framework whereby the organization will continue to operate when the threatened event occurs or resume operations with a minimum of disruption. True False

32. Business continuity is the process of using backup measures to restore lost data and resume operations. True False

33. With continuous data protection (CDP) all data changes are data stamped and saved to secondary systems as the changes are happening. True False


34. The disaster backup and recovery technique known as electronic vaulting is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party. True False

35. The disaster recovery strategy known as a cold site is a fully equipped data center that is made available to client companies for a monthly subscriber fee. True False

36. A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a hot site. True False

37. In a logic bomb attack, a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities. True False

38. Biometric identification systems identify authorized personnel through some unique physical trait such as fingers, hands, voice, eyes, face, or writing dynamics. True False

39. Antivirus is a technique to protect one network from another "untrusted" network. True False

40. The most common biometric devices perform retinal eye scans. True False

41. Access control software ensures that only authorized users gain access to a system through a process of identification and authentication. True False

42. Threat monitoring is a technique to protect one network from another "untrusted" network. True False


43. Application controls restrict access to data, programs, and documentation. True False

44. An intrusion-detection systems (IDS) logs and monitors who is on or trying to access the network. True False

45. Intrusion-prevention systems (IPS) actively block unauthorized traffic using rules specified by the organization. True False

46. Periodic cleaning, testing, and adjusting of computer equipment is referred to as preventative maintenance. True False

47. Computer hacking and cracking is the intentional, unauthorized access to an organization's computer system, accomplished by bypassing the system's access security controls. True False

48. The use of IT resources for enterprise systems and e-business: A. magnifies the importance of protecting the resources both within and outside of the organization from risks B. magnifies the importance of protecting the resources both within but not outside the of the organization from risks C. makes it easier to provide internal control risk when IT resources are interlinked D. none of the above

49. Top 10 management concerns about IT's capability to support an organization's vision and strategy include all except the following: A. decline in IT investments during recession B. overall security of IT assets C. the Internet D. need for project management leadership


50. Top security concerns reported by IT security professionals include all the following except: A. data breaches B. cyber crimes and cyber attacks C. data backup D. workforce mobility

51. Pervasive control plans: A. are unrelated to applications control plans B. are a subset of applications control plans C. influence the effectiveness of applications control plans D. increase the efficiency of applications control plans

52. COBIT was developed to: A. provide guidance to managers, users, and auditors on the best practices for the management of information technology B. identify specific control plans that should be implemented to reduce the occurrence of fraud C. specify the components of an information system that should be installed in an e-commerce environment D. suggest the type of information that should be made available for management decision making

53. The department or function that develops and operates an organization's information systems is often called the: A. information systems organization B. computer operations department C. controller's office D. computer technology branch

54. In an information systems organization structure, the three functions that might logically report directly to the CIO would be: A. systems development, technical services, and data center B. systems development, database administration, and data center C. systems development, technical services, and data librarian D. applications programming, technical services, and data center

55. COBIT was developed by: A. COSO B. IT Governance Institute C. PCAOB D. AICPA


56. Quality assurance function: A. modifies and adapts application software B. conducts reviews to determine adherence to IT standards C. analyzes existing applications and proposes solutions D. supervises applications systems development

57. This IT function's key control concern is that organization and IT strategic objectives are misaligned: A. CIO B. quality assurance C. IT steering committee D. systems development manager

58. can consist of many computers and related equipment connected together via a network. A. PCs B. Servers C. LAN D. Firewall

59. In an information systems organization, which of the following reporting relationships makes the least sense? A. The data center manager reports to the CIO. B. The systems development manager reports to the data center manager. C. Database administration reports to the technical services manager. D. The data librarian reports to the data center manager.

60. In an information systems organization, all of the following functions might logically report to the data center manager except: A. data control B. computer operations C. data librarian D. quality assurance

61. Managing functional units such as networks, CAD/CAM and systems programming typically is a major duty of: A. data center manager B. systems development C. technical services manager D. database administrator


62. From the standpoint of achieving the operations system control goal of security of resources, which of the following segregation of duties possibilities is least important? A. between systems programming and computer operations B. between data control and data preparation personnel C. between systems development and computer operators D. between technical services and data center

63. A key control concern is that certain people within an organization have easy access to applications programs and data files. The people are: A. data librarians B. systems programmers C. systems development D. data center managers

64. Which of the following has the major duties of prioritizing and selecting IT projects and resources? A. steering committee B. security officer C. CIO D. systems development manager

65. Which of the following has the responsibility to ensure the security of all IT resources? A. steering committee B. security officer C. CIO D. systems development manager

66. Which of the following has the responsibility of efficient and effective operation of IT? A. steering committee B. security officer C. CIO D. systems development manager

67. In an information systems organizational structure, the function of control data and is a central point of vulnerability. A. data control B. data entry C. data librarian D. database administration

is the central point from which to


68. The control concern that there will be a high risk of data conversion errors relates primarily to which of the following information systems functions? A. data control B. data entry C. data librarian D. database administration

69. The controlled access to data, programs, and documentation is a principal responsibility of which of the following functions? A. data control B. data preparation (data entry) C. data librarian D. computer operator

70. Which of the following is not one of COBIT's four broad IT control process domains? A. plan and organize B. acquire and implement C. repair and replace D. monitor and evaluate

71. Which of the following is not a strategic planning process? A. IT-related requirements to comply with industry, regulatory, legal, and contractual obligations, including privacy, transborder data flows, e-business, and insurance contracts. B. Acquisition and development schedules for hardware, software, and application systems and for personnel and financial requirements. C. Systems development life cycle adoption to ensure that comprehensive documentation is developed for each application. D. An inventory of current IT capabilities.

72. Which one of the following personnel is not involved in safeguarding resources resulting from consummating events? A. security officer B. technical service manager C. database administrator D. Chief Information Officer


73. The segregation of duties control plan consists of separating all of the following event-processing functions except: A. planning events B. authorizing events C. executing events D. recording events

74. A warehouse clerk manually completing an order document and forwarding it to purchasing for approval is an example of: A. authorizing events B. executing events C. recording events D. safeguarding resources

75. Specifications for availability, reliability, performance, capacity for growth, levels of user support, disaster recovery, security, minimal system functionality, and service charges are included in: A. application documentation B. service-level requirements C. business continuity plan D. security plan

76. Approving a customer credit purchase would be an example of which basic events processing function? A. authorizing events B. executing events C. recording events D. safeguarding resources

77. An employee of a warehouse is responsible for taking a computer-generated shipping list, pulling the items from the warehouse shelves and placing them on a cart which is transferred to shipping when the list is completely filled. This is an example of: A. authorizing events B. executing events C. recording events D. safeguarding resources


78. An outside auditing firm annually supervises a physical count of the items in a retail store's shelf inventory. This is an example of: A. authorizing events B. executing events C. recording events D. safeguarding resources

79. A warehouse supervisor prepares a sales order listing items to be shipped to a customer and then signs it approving the removal of the items from the warehouse. The supervisor is performing which functions? A. authorizing events and safeguarding of resources B. executing and recording events C. authorizing and executing events D. authorizing and recording events

80. A clerk receives checks and customer receipts in the mail. He endorses the checks, fills out the deposit slip, and posts the checks to the cash receipts events data. The clerk is exercising which functions? A. recording and executing events B. authorizing and executing events C. recording and authorizing events D. safeguarding of resources and authorizing events

81. When segregation of duties cannot be effectively implemented because the organization is too small, we may rely on a more intensive implementation of other control plans such as personnel control plans. This is called: A. collusion controls B. compensatory controls C. authorizing controls D. inventory controls

82. A method of separating systems development and operations is to prevent programmers from: A. performing technical services B. performing database administration C. handling accounting operations D. operating the computer


83. Which of the following control plans is not a retention control plan? A. creative and challenging work opportunities B. occasional performance evaluations C. competitive reward structure D. viable career paths

84. Personnel development control plans consist of each of the following except: A. checking employment references B. providing sufficient and timely training C. supporting employee educational interests and pursuits D. performing scheduled evaluations

85. The primary reasons for performing regular employee performance reviews include all of the following except: A. determine whether an employee is satisfying the requirements indicated by a job description B. assess an employee's strengths and weaknesses C. assist management in determining salary adjustments, promotions, or terminations D. develop a strategy for filling necessary positions

86. A policy that requires employees to alternate jobs periodically is called: A. segregation of duties B. forced vacations C. rotation of duties D. personnel planning

87. A control plan that is designed to detect a fraud by having one employee periodically do the job of another employee is called: A. segregation of duties B. forced vacations C. periodic audits D. management control

88. A mechanism by which a company is reimbursed for any loss that occurs when an employee commits fraud is called a: A. segregation of duties B. fidelity bond C. personnel planning control D. termination control plan


89. Which of the following personnel security control plans is corrective in nature as opposed to being a preventive or detective control plan? A. rotation of duties B. fidelity bonding C. forced vacations D. performing scheduled evaluations

90. Personnel termination control plans might include all of the following except: A. require immediate separation B. identify the employee's reasons for leaving C. establish a policy of forced vacations D. collect the employee's keys, badges, etc.

91. Instructions for computer setup, required data, restart procedures, and error messages are typically contained in a(n): A. systems development standards manual B. program documentation manual C. operations run manual D. application documentation manual

92. Application documentation that describes the application and contains instructions for preparing inputs and using outputs is a(n): A. operations run manual B. user manual C. program documentation D. systems documentation

93. Alternative names for contingency planning include all of the following except: A. disaster recovery planning B. business interruption planning C. business disaster planning D. business continuity planning

94. A data replication strategy where all data changes are data stamped and saved to secondary systems as the changes are happening is called: A. mirror site B. electronic vaulting C. continuous data protection (CDP) D. Dumping


95. All of the following are components of a backup and recovery strategy except: A. echo checking B. mirror site C. electronic vaulting D. hot site

96. Which of the following statements related to denial of service attacks is false? A. Insurance is available to offset the losses suffered by denial of service attacks. B. A denial of service attack is designed to overwhelm a Web site, making it incapable of performing normal functions. C. Web sites can employ filters to sense multiple messages from a single site. D. The most effective attacks originate from a small cluster of computers in a remote geographic region.

97. In an on-line computer system, restricting user access to programs and data files includes all of the following except: A. user identification B. user authentication C. determining user access rights D. wearing identification badges

98. Sending out an e-mail pretending to be a legitimate business asking for information about a person's account is called: A. dumpster diving B. phishing C. smoozing D. shoulder surfing

99. Which of the following controls restrict access to programs, data, and documentation? A. library controls B. password controls C. authentication controls D. program change controls

100. This logs and monitors who is on or trying to access an organization's network. A. biometrics B. electronic vaulting C. intrusion detection systems (IDS) D. firewall


101. Protecting resources against environmental hazards might include all of the following control plans except: A. fire alarms and smoke detectors B. waterproof ceilings C. voltage regulators D. rotation of duties

102. Searching through rubbish for system information such as passwords is called: A. scavenging B. phishing C. smoozing D. shoulder surfing

103. is a process that ensures that the enterprise's IT sustains and extends the organization's strategies and objectives.

104. controls provide assurance that all modifications to programs are authorized and documented, and that the changes are completed, tested, and properly implemented.

105. is a process that employs mathematical algorithms and encryption keys to encode data (i.e., change un-encoded data, called plaintext, to a coded text form, called ciphertext) so that it is unintelligible.

106. are particularly important because they operate across all business processes and affect a company's capability to meet a multitude of control goals.

107. in an internal control system means assessment by management to determine whether the control plans in place are continuing to function appropriately over time.


108. The function composed of people, procedures, and equipment and is typically called the information systems department, IS department, or IT department is the .

109. The coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

110. The

is charged with safeguarding the IT organization.

111. Management should establish a(n) plan and implement related activities, including reviews, audits, and inspections, to ensure the attainment of IT customer requirements.

112. The group is responsible for routing all work in to and out of the data center, correcting errors, and monitoring all error correction.

113. The function provides efficient and effective operation of the computer equipment by performing tasks such as mounting tapes, disks, and other media and monitoring equipment operation.

114. The documentation.

maintains custody of and controls access to programs, files, and

115. Combining the functions of authorizing and executing events is a violation of the organizational control plan known as .


116. Segregation of duties consists of separating the four functions of authorizing events, events, events, and safeguarding the resources resulting from consummating the events.

117. One method for circumventing segregation of duties is or more persons (or departments) to exploit a system and conceal an abuse such as fraud.

between one

118. A small organization that does not have enough personnel to adequately segregate duties must rely on alternative controls, commonly called .

119. The functions of the commonly include assigning passwords and making sure the IT organization is secure from physical threats.

120. The coordinates the organizational and IT strategic planning processes and reviews and approves the strategic IT plan.

121. The policy of requiring an employee to alternate jobs periodically is known as .

122. is a policy of requiring an employee to take leave from the job and substituting another employee in his or her place.

123. A(n) defalcations committed by its employees.

indemnifies a company in case it suffers losses from


124. The covers the progression of information systems through the systems development process, from birth, through implementation, to ongoing use and modification.

125. Computer software that is used to facilitate the execution of a given business process is called .

126. The documentation portion of application documentation provides an overall description of the application, including the system's purpose; an overview of system procedures; and sample source documents, outputs, and reports.

127. documentation provides a description of an application computer program and usually includes the program's purpose, program flowcharts, and source code listings.

128. The control about a particular application.

gives detailed instructions to computer operators and to data

129. The in preparing inputs and using outputs.

describes user procedures for an application and assists the user

130. consistently in those jobs.

are documents that help users learn their jobs and perform

131.

controls restrict access to data, programs and documentation.


132. The terms planning, disaster recovery planning, business interruption planning, and business continuity planning have all been used to describe the backup and recovery control plans designed to ensure that an organization can recover from a major calamity.

133. is a service whereby data changes are automatically transmitted over the Internet on a continuous basis to an off-site server maintained by a third party.

134. With the data replication strategy known as stamped and saved to secondary systems as the changes are happening.

all data changes are data

135. The disaster recovery strategy known as a(n) is a fully equipped data center that is made available on a standby basis to client companies for a monthly subscriber's fee.

136. A facility usually comprised of air-conditioned space with a raised floor, telephone connections, and computer ports, into which a subscriber can move equipment, is called a(n) .

137. In a(n) a Web site is overwhelmed by an intentional onslaught of thousands of simultaneous messages, making it impossible for the attacked site to engage in its normal activities.

138. identification systems identify authorized personnel through some unique physical trait such as fingers, hands, voice, eyes, face, and writing dynamics.

139. A(n) network.

is a technique to protect one network from another "untrusted"


140. The most common biometric devices read

.

141. In an online environment, ensures that only authorized users gain access to a system through a process of identification (e.g., a unique account number for each user) and authentication.

142. In an online computer environment, the accumulation of access activity and its review by the security officer is also called .

143. Periodic cleaning, testing, and adjusting of computer equipment is referred to as .

144. is the intentional unauthorized access of an organization's computer system, accomplished by bypassing the system's access security controls.

145. Copies of important stored data, programs, and documentation made periodically are called .

146. The process whereby lost data is restored and operations are continued is called .

147. The site that maintains copies of a primary computing site's programs and data is a(n) site.


148. A(n) uses many computers, called zombies, that unwittingly cooperate in a denial-of-service attack by sending messages to the target Web site.

149. The

logs and monitors who is on or is trying to access the network.

150. The organization.

actively blocks unauthorized traffic using rules specified by an

151. Watching a user type in passwords or user IDs or listening as they give account information over the phone is called .

152. pretext.

is when a hacker calls and requests a password based on some

153. helps to solve the problem posed by single key cryptography by employing a pair of matched keys for each system user, one private (i.e., known only to the party who possesses it) and one public.

154. is when an e-mail is sent pretending to be a legitimate business asking for information about your account.


155. Below is a list of ten functional titles for the information systems organization structure shown in Chapter 8. The second list contains descriptions (some partial) of the duties and responsibilities of ten of the functions. Required: On the blank line to the left of each numbered description, place the capital letter of the functional title that best matches the duties and responsibilities described. Do not use a letter more than once.

Function al Title A. Quality assurance B. Data control C. Data librarian D. Data entry E. Systems development manager

Answers

F. G. H. I. J.

Systems programming Technical services manager CIO IT Steering committee Security officer

DUTIES AND RESPON SIBILITI ES 1.

Deliver cost-effective, bug-free applications.

2.

Route all work into and out of the data center, correct errors, and monitor all error correction.

3.

Plan IT acquisition and development.

4.

Conduct reviews to determine adherence to IT standards and procedures and achievement of IT objectives.

5.

Issue programs, data, and documentation to authorized users.

6.

Manage functional units such as networks, CAD/CAM and systems programming.

7.

Modify and adapt systems software including operating systems and various utility routines.

8.

Prepare input for computer processing.

9.

Manages physical security and logical security.

10.

Prioritize and select IT projects and resources.

156. The four events-processing functions that constitute the segregation of duties control plan are: A. B. C. D.

Authorizing events Executing events Recording events Safeguarding resources


Required: Below is a list of ten events-processing activities, five relating to the cycle of activities involved in processing a sales event and seven relating to the cycle for a purchase event. Classify each of the twelve activities into one of the four functional categories listed above by placing the letter A, B, C, or D on the answer line to the left of each number. You should use only one letter for each of the answers. EVENTPROCES SING ACTIVIT IES Answers

(For a sales event) 1.

The order entry department instructs the shipping department to ship goods to a customer by sending an approved document to the shipping department.

2.

The shipping department keeps inventory items in a locked storeroom.

3.

The billing department prepares and mails a bill to the customer.

4.

The invoice in item 3 is added to the customer balance in the accounts receivable master data.

5.

The general ledger bookkeeper enters a sales event in a data file. (For a purchase event)

6.

The purchasing department order goods.

7.

The inventory control department signs a document requesting that goods be purchased.

8.

The purchasing department manager reviews and signs all purchase order documents in excess of $100.

9.

The receiving department processes goods received from the vendor.

10.

The receiving department completes the receiving report.

11.

After being received goods are placed into the locked inventory storeroom.

12.

A payable is recognized by updating the accounts payable master data.


157. Listed below are several pervasive control plans discussed in Chapter 8. On the blank line to the left of each control plan, insert a "P" (preventive), "D" (detective), or "C" (corrective) to best classify that control. If you think that more than one code could apply to a particular plan, insert all appropriate codes

CODE

CONTROL PLAN 1.

Service level agreements

2.

Program change controls

3.

Fire and water alarms

4.

Adequate fire and water insurance

5.

Install batteries for temporary loss in power

6.

Continuous-data protection (CDP)

7.

Intrusion-detection system (IDS)

8.

IT steering committee

9.

Security officer

10.

Operations run manuals

11.

Rotation of duties and forced vacations

12.

Fidelity bonding

13.

Personnel performance evaluations

14.

Personnel termination procedures

15.

Segregation of duties

16.

Strategic IT plan

17.

Disaster recovery planning

18.

Restrict entry to the computer facility through the use of security guards, locks, badges, and identification cards

19.

Personnel management (supervision)

20.

Library controls


158. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, then choose a detective or a corrective plan. A letter should be used only once.

Control Plans A. Personnel development control plans B. Operations run manuals C. Disaster recovery plans D. Program change controls E. Librarian controls F. Segregation of systems development and programming from computer operations G. Retention control plans H. Restriction of physical access to computer resources I. Segregation of recording events from safeguarding resources J. Biometric identification system

Answers

SYSTEM FAILUR ES 1.

The controller at Infotech, Inc. has just completed an analysis of personnel costs and believes that the cost associated with training new personnel is too high. She attributes this high cost to the increasing rate at which employees are being hired to replace defections to Infotech's competitors.

2.

Paul the programmer has modified the accounts receivable statement program so that the receivables from his cousin Peter will be eliminated from the accounts receivable master file upon printing of the monthly statements. Paul made these changes to the program while he was operating the computer on a Saturday morning.

3.

When the hurricane hit the coast, Soggy Records Company lost the use of its flooded computer room. In such cases, plans called for using an alternate computer center 100 miles inland. However, Soggy was unable to operate in the alternate facility because the company's programs and files were lost in the flooded computer facility.

4.

All the files were lost at the Stoughton Company when a visitor sat down at a computer terminal, signed on using one of the passwords posted on the computer terminals, and erased some of the data files.

5.

Sally is the inventory control/warehouse clerk at Techtron Inc. She has been stealing secret computer components from the warehouse, selling them to foreign agents, and covering up her thefts by altering the inventory records.

6.

At Maralee Company, there seems to be a lack of progression from lower to middle management. Edward, the director of personnel, believes that the people being hired have great potential, but they are just not realizing their potential.

7.

Roger, the night-shift computer operator, has had occasion several times in the last month to call his supervisor to receive assistance¾over the telephone¾to correct a problem that he was having in operating the computer.

8.

Mary had become quite unhappy with her job at Funk, Inc. She knew that she was going to quit soon and decided to destroy some computer files. Using her own username and password, she found several disk packs on a table outside the computer room and proceeded to "erase" the data with a powerful magnet. After Mary's departure, Funk spent several months reconstructing the data that had been on the lost files.

9.

One of the inventory control programs at Excess Company has been ordering more inventory than is required, causing an overstock condition on many items. During an investigation of the problem, it was discovered that the inventory ordering program had recently been changed. The changes were approved, but the new program was never tested.

10.

Sydney, the computer operator, did not want to go to work one day because he wanted to go sailing. He gave his ID card to his cousin Vinny who went to work for him. Even though he was a computer operator, Vinny did not know how to operate this computer. He made mistakes and destroyed some data.


159. The first list below contains 10 control plans discussed in Chapter 8. The second list describes 10 system failures that have control implications. Required: On the answer line to the left of each system failure, insert the capital letter from the first list of the best control plan to prevent the system failure from occurring. (If you can't find a control that will prevent the failure, then choose a detective or corrective control plan). A letter should be used only once.

Control Plans A. Selection and hiring control plans B. Documentation control plans C. Personnel termination control plans D. Segregation of duties E. Biometric identification system F. Fire-protection control plans G. IT steering committee H. Off-site storage of back up computer files I. Program change controls J. Continuous-data protection (CDP)


Answers

SYSTEM FAILUR ES 1.

Peter the programmer asked for a substantial increase in salary and benefits. When turned down, he submitted his two week notice. During those two weeks he infected the program he was working on with a damaging computer virus.

2.

Cary enters cash receipts into the computer at Kiting Inc. For the past year she has been pocketing customer payments. To keep herself from being discovered, she enters credit memos into the computer, which records them as reductions in the customers' accounts receivable records¾as if the payment had been made.

3.

Procedures for the approval of orders have been put in place at Overstock Company. Clyde, the new purchasing agent, was given a briefing on these procedures when he was hired and has been applying those procedures as best as he can remember them. Consequently, Clyde sometimes orders more inventory than is required.

4.

The new sales reporting system includes a computer printout that was supposed to report daily sales to the V.P. of marketing. The report was never tested and contains erroneous sales figures and is not presented in the format required by the V.P.

5.

There was a flood and all of the computers and all their data were destroyed.

6.

Freida was just hired as a computer operator at Vertigo Inc. Just a few days after being hired, she discovered that she would not be allowed to spend some of her time writing computer programs. This was contrary to what she was told initially, and she is now quite unhappy with her circumstances.

7.

After careful screening and selection of employees, an organization issues its employees name badges with magnetic strips that stores the employees' personal information. Employees in the IT function can scan the badges to gain entry into various rooms within the IT center. Recently management discovered that employees are sharing their badges to enable them to gain access to every room in the facility.

8.

A fire at the Mitre Corporation caused the release of a poisonous gas which contaminated the entire building. While the computer files were not destroyed during the fire, they were contaminated and cannot be removed from the building and personnel cannot enter the building. It took several months to recreate the computer files.

9.

Sandisfield, Inc. has many IT projects under consideration for development. The CFO has some political connections with the CIO and so financial applications are given a green light for development while projects for marketing and logistics are put on hold.

10.

Jet Red Airlines, a new, low-cost start-up airline, has decided to operate its own Web site and reservation system that is running on servers located at the headquarters. One day, the server room was flooded, the reservation system was not available for many hours, and many reservations were lost.


Chapter 8--Controlling Information Systems: Introduction to Pervasive Controls Key

1. TRUE 2. TRUE 3. TRUE 4. TRUE 5. FALSE 6. TRUE 7. TRUE 8. FALSE 9. TRUE 10. FALSE 11. TRUE 12. FALSE 13. TRUE 14. TRUE 15. TRUE 16. FALSE 17. FALSE 18. TRUE 19. FALSE 20. FALSE 21. TRUE 22. TRUE 23. FALSE 24. FALSE 25. TRUE 26. TRUE 27. FALSE 28. FALSE


29. TRUE 30. TRUE 31. TRUE 32. FALSE 33. TRUE 34. TRUE 35. FALSE 36. FALSE 37. FALSE 38. TRUE 39. FALSE 40. FALSE 41. TRUE 42. FALSE 43. FALSE 44. TRUE 45. TRUE 46. TRUE 47. TRUE 48. A 49. C 50. C 51. C 52. A 53. A 54. A 55. B 56. B 57. C 58. C 59. B 60. D 61. C 62. B


63. B 64. A 65. B 66. C 67. D 68. B 69. C 70. C 71. C 72. D 73. A 74. B 75. B 76. A 77. B 78. D 79. C 80. A 81. B 82. D 83. B 84. A 85. D 86. C 87. B 88. B 89. B 90. C 91. C 92. B 93. C 94. C 95. A 96. D


97. D 98. B 99. A 100. C 101. D 102. A 103. IT governance 104. Program change 105. Data encryption 106. Pervasive controls 107. Monitoring 108. information systems organization or IS organization 109. IT steering committee 110. security officer 111. quality assurance or quality assurance (QA) or QA 112. data control 113. computer operations 114. data librarian 115. segregation of duties 116. executing, recording or recording, executing 117. collusion 118. compensatory controls 119. security officer 120. IT steering committee 121. rotation of duties 122. Forced vacations 123. fidelity bond 124. system development life cycle (SDLC) or system development life cycle or SDLC 125. application software 126. systems or system 127. Program 128. operations run manual 129. user manual 130. Training materials


131. Library 132. contingency 133. Electronic vaulting 134. continuous data protection (CDP) or continuous data protection or CDP 135. hot site 136. cold site 137. denial of service attack 138. Biometric 139. firewall 140. fingerprints 141. access control software 142. threat monitoring 143. preventive maintenance 144. Computer hacking and cracking or computer hacking or computer cracking 145. backups 146. recovery 147. mirror 148. distributed denial-of-service attack 149. intrusion-detection system (IDS) or ntrusion-detection system or IDS 150. intrusion-prevention system (IPS) or intrusion-prevention system or IPS 151. shoulder surfing 152. Smoozing 153. Public-key cryptography 154. Phishing 155. Duties and Responsibilities 1 2 3 4 5 6 7 8 9 10

Answer E B H A C G F D J I


156. Event-Processing Activity 1 2 3 4 5 6 7 8 9 10 11 12

Answer A D B C C B A A B B D C

157. CODE

CONTROL PLAN

P&C

1.

Service level agreements

P

2.

Program change controls

D

3.

Fire and water alarms

C

4.

Adequate fire and water insurance

C

5.

Install batteries for temporary loss in power

C

6.

Continuous-data protection (CDP)

D

7.

Intrusion-detection system (IDS)

P

8.

IT steering committee

P&D

9.

Security officer

P

10.

Operations run manuals

P&D

11.

Rotation of duties and forced vacations

C

12.

Fidelity bonding

P&D

13.

Personnel performance evaluations

P

14.

Personnel termination procedures

P&D

15.

Segregation of duties

P

16.

Strategic IT plan

C

17.

Disaster recovery planning

P

18.

Restrict entry to the computer facility through the use of security guards, locks, badges, and identification cards

P&D

19.

Personnel management (supervision)

P&D

20.

Library controls


158. System Failure Number 1 2 3 4 5 6 7 8 9 10

Answer G F C H I A B E D J

159. System Failure Number 1 2 3 4 5 6 7 8 9 10

Answer C D B I H A E F G J


Chapter 9--Controlling Information Systems: Business Process and Application Controls Student: 1. Specifying control goals is the first step in preparing a control matrix. True False

2. In the control matrix M-1 stands for missing process number one. True False

3. A control matrix is a tool that assists in evaluating the potential effectiveness of control goals in a particular business process. True False

4. Control efficiency addresses whether control goals are being achieved. True False

5. Control effectiveness addresses how individual control plans achieve multiple control goals. True False

6. The purpose of security controls is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse. True False

7. Control redundancy addresses whether too many control plans are directed toward the same control goal. True False

8. Input control goals include those to ensure input validity, input completeness and input accuracy. True False


9. In a control matrix P-1 stands for process number one. True False

10. The most error-prone and inefficient steps in an operations or information process is master file updates. True False

11. A control plan in which a source document is designed to make it easier to prepare the document initially and later to input data from the document into a computer or other input device is called document design. True False

12. Written approval takes the form of a signature or initials on a document to indicate that the proper person has authorized the event. True False

13. Online prompting helps guide the online entry of data by defining the acceptable length and format of certain fields. True False

14. With preformatted screens a computer system asks the user for input or asks questions that the user must answer. True False

15. Programmed edit checks are edits automatically performed by data entry programs upon entry of the input data. True False

16. A variation of the limit check is the reasonableness check. True False

17. Dollar totals represent a summarization of any numeric data field within the input document or record. True False


18. The edit that compares calculations performed manually to those performed by the computer to determine if a document has been entered correctly is referred to as mathematical accuracy checks. True False

19. A check digit is an extra digit that is added to the identification number of entities to help control the accuracy with which the number is entered into a computer system. True False

20. Confirm input acceptance is a control that helps ensure input completeness by informing the user that the input has been accepted for processing. True False

21. The control plan called key verification is designed to reduce the possibility that data will be misread or miskeyed during data entry. True False

22. A dependency check authenticates the identity of a message's sender and verifies the integrity of a transmitted message. True False

23. A digital signature tests whether the contents of two or more data fields bear the correct logical relationship. True False

24. An exception and summary report reflects the events that were accepted or rejected by the system. True False

25. Master data control plans regulate transaction processing by calculating control totals at various points in a processing run and subsequently comparing these totals. True False

26. Document/record counts are simple counts of the number of documents entered. True False


27. A count of the number of invoices being paid by all of the customer remittances is a type of batch control total called an item or line count. True False

28. A summation of the dollar value of items in a batch is called a hash total. True False

29. A hash total is the general term to describe the summation of data that would not normally be totaled except for control purposes. True False

30. A turnaround document is a document that is printed as an output of multiple computer processes and is used to capture and input a previous transaction. True False

31. Batch control plans regulate information processing by calculating control totals at various points in a processing run and subsequently comparing those totals. True False

32. In order to implement a batch sequence check transactions must be captured on documents that are randomly numbered. True False

33. Dollar totals are a summarization of the dollar value of items in the batch. True False

34. In a batch sequence check a computer program sorts the input documents into numerical order; checks the documents against the sequence number range; and reports missing, duplicate, and out-of-range data. True False

35. The cumulative sequence check provides input control in those situations in which the serial numbers are assigned within the organization but are not entered in perfect serial number sequence. True False


36. A tickler file is a manual or computer file of documents that contain completed business data. True False

37. The two primary steps in preparing the control matrix include: A. specifying control goals, identifying recommended control plans B. specifying control plans, specifying input goals C. specifying the control environment, identifying information process goals D. specifying control procedures, identifying process goals

38. The purpose of control goals is to ensure the successful accomplishment of the goals set forth for the operations process under consideration. A. efficiency B. effectiveness C. security D. input

39. The purpose of control goals is to ensure that all resources used throughout the business process are being employed in the most productive manner. A. efficiency B. effectiveness C. security D. input

40. The purpose of control goals is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse. A. efficiency B. effectiveness C. security D. input

41. Entity resources that are always considered in efficiency assessments for an AIS are: A. cash and equipment B. inventory and cash C. people and computers D. fixed assets and inventory


42. The purpose of input control goals is to ensure: A. input validity, input completeness, and input accuracy B. update completeness and update accuracy C. input accuracy D. none of the above

43. In a control matrix the coding P-1 means: A. process 1 B. process 1 is present C. process 1 is missing D. none of the above

44. In a control matrix, the coding M-1 means: A. a major control plan B. a missing control plan C. process 1 is missing D. none of the above

45. The most error-prone and inefficient steps in an operations or information process is: A. report generation B. master data update C. data entry D. none of the above

46. The columns in a control matrix contain headings listing the business process: A. control goals B. control plans C. control environment D. control procedures

47. In the control matrix, the rows represent: A. control goals of the operations process B. recommended control plans including both present and missing controls C. control goals of the information process D. control goals of the management process


48. Having too many control plans directed at the same control goal is called: A. control efficiency B. control effectiveness C. control redundancy D. control completeness

49. Which of the following control plans is not directed primarily at the control goal of input accuracy? A. document design B. written approvals C. preformatted screens D. online prompting

50. Which of the following is a control plan in which the source document is designed to make it easier to input data from the document? A. document design B. written approval C. preformatted screens D. online prompting

51. Which of the following is a control plan that takes the form of signatures or initials on a document to indicate that a person has authorized the event? A. document design B. written approval C. preformatted screens D. online prompting

52. Which of the following is a control plan that controls the entry of data by defining the acceptable format of each data field? A. document design B. written approval C. preformatted screens D. online prompting

53. Which of the following is a control plan that requests user input or asks questions that the user must answer? A. document design B. written approval C. preformatted screens D. online prompting


54. Before a completed input screen is recorded the data entry clerk is asked if the data should be accepted. This is which control plan? A. online prompting B. mathematical accuracy check C. preformatted screen D. confirm input acceptance

55. Which of the following reflects a summarization of any numeric data field within the input document or record? A. reasonableness check or limit check B. document/record hash totals C. mathematical accuracy check D. check digit

56. Which of the following compares manual calculations to computer calculations? A. reasonableness check or limit check B. document/record hash totals C. mathematical accuracy check D. check digit

57. A control that can be used to ensure that all of the characters of a social security number are entered by a data entry clerk is: A. dependency check B. procedures for rejected inputs C. preformatted screens D. turnaround documents

58. A written approval in the form of a signature or initials on a document indicating that a person has authorized the event is directed primarily at achieving the control goal of: A. ensure input validity B. ensure input completeness C. ensure input accuracy D. ensure update accuracy


59. A control that can be used to reduce the likelihood of an error occurring when an account number is entered into a computer is: A. check digit B. data encryption C. preformatted screens D. reasonableness checks

60. Which of the following control plans is designed to achieve the goal of input completeness? A. key verification B. confirm input acceptance C. programmed edit check D. written approvals

61. A control whose primary purpose is to ensure greater input accuracy is: A. written approvals B. preformatted screens C. confirm input acceptance D. all of these ensure greater input accuracy

62. Not knowing whether input data has been accepted by the information system, the user enters the data again, resulting in duplicate event data. The control plan that helps to prevent this error is: A. key verification B. confirm input acceptance C. check digit D. online prompting

63. Which of the following control plans is designed to achieve the goal of input accuracy? A. key verification B. confirm input acceptance C. batch sequence check D. cumulative sequence check

64. A control in which two people key the same inputs into a system where they are compared is called: A. online prompting B. key verification C. computer matching procedures D. a redundancy check


65. Which of the following control plans is designed both to authenticate a system user's identity and to verify the integrity of a message transmitted by that user? A. coding schemes B. digital signature C. preformatted screens D. check digit

66. A control that is primarily directed at ensuring input validity is: A. written approvals B. programmed edit checks C. confirm input acceptance D. online prompting

67. Digital signatures address all of the following control goals except: A. ensure security of resources B. ensure input completeness C. ensure input validity D. ensure input accuracy

68. A sales representative enters the customer's account number and the system retrieves certain data about the customer from master data. This control plan addresses all of the control goals except: A. ensure efficient employment of resources B. ensure effectiveness of operations (timeliness) C. ensure input accuracy D. ensure update completeness

69. Online prompting is aimed primarily at ensuring which of the following information systems control goals? A. ensure input accuracy B. ensure input completeness C. ensure security of resources D. ensure update completeness

70. All of the following are types of programmed edit checks except: A. a proximity check B. a document/record hash total C. a mathematical accuracy check D. a reasonableness check


71. Which of the following is not a programmed edit check? A. online prompting B. check digit C. mathematical accuracy check D. limit checks

72. A control report generated by a system that shows data about transactions that were accepted or rejected during a transaction processing step is called a(n): A. violation report B. exception and summary report C. variance report D. program change log

73. Which of the following is a batch control total that represents the minimum level of control for input completeness? A. dollar totals B. document/record counts C. hash totals D. item counts

74. A summation of customer account numbers taken from a batch of sales invoices would be classified as a: A. record count B. line count C. dollar total D. hash total

75. Which batch control total generally has no other purpose than control? A. dollar totals B. record counts C. hash totals D. item counts

76. Which of the following types of batch totals is likely to be most effective in ensuring the control goal of input accuracy? A. line counts B. document/record counts C. item counts D. hash totals


77. When they are sent to a customer and returned with the payment, remittance advices are examples of: A. batch control totals B. computer-prepared documents C. written approval controls D. turnaround documents

78. Which of the following activities is not part of the computer agreement of batch totals? A. a batch total is manually established and entered into the computer prior to data entry. B. data shown on source documents are key entered or scanned. C. the computer produces a report that includes a batch total. D. a person reconciles the manual and computer batch totals.

79. Which of the following controls requires that documents be numbered sequentially or prenumbered before it can be implemented? A. completeness check B. sequence check C. batch total matching D. key verification

80. Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: A. cumulative sequence check B. batch sequence check C. suspense file of missing numbers D. computer agreement of batch totals

81. Which of the following statements related to tickler files is false? A. A tickler file is reviewed on a regular basis for items that do not clear the file on a timely basis. B. A tickler file can consist of documents or computer records. C. A tickler file addresses the control goal of update accuracy. D. A tickler file addresses the control goal of input completeness.

82. The process of encoding data so that it may only be read by someone having a key is called: A. a coding scheme B. encryption C. dependency checks D. check digit


83. Plaintext is a term associated with A. coding schemes B. hash totals C. programmed edit checks D. data encryption

84. Specifying

85. In the control matrix the P stands for

.

is the first step in preparing a control matrix.

controls.

86. A(n) is a tool that assists in evaluating the potential effectiveness of controls in a particular business process by matching control goals with relevant control plans.

87. Control

addresses whether the control goals are being achieved.

88. Control multiple control goals.

addresses the extent to which individual control plans achieve

89. The purpose of controls is to ensure that entity resources are protected from loss, destruction, disclosure, copying, sale, or other misuse.

90. Control the same control goal.

addresses whether too many control plans are directed toward


91. Input control goals include those for ensuring input validity, input and input .

92. The use of the letter M in a control matrix represents a(n)

,

.

93. The most error-prone and inefficient step in an operations or information process is .

94. A control plan that makes it easier to prepare the document initially and later to input data from the document is called .

95. takes the form of a signature or initials on a document to indicate that the proper person has authorized the event.

96. control the online entry of data by defining the acceptable format of each data field, automatically moving to the next field, requiring that certain fields be completed, and/or automatically populating certain fields.

97. questions that the user must answer.

describes a computer system asking the user for input or asking

98. of the input data.

are edits automatically performed by data entry programs upon entry


99. A(n)

100. document or record.

check is a variation of a limit check.

represent a summarization of any numeric data field within the input

101. The edit that compares calculations performed manually with those performed by the computer to determine if a document has been entered correctly is referred to as

.

102. A(n) digit is an extra digit that is added to an identification number to help control the accuracy with which the number is entered into a computer system.

103. The control processing.

104. The control plan called will be misread or miskeyed during data entry.

105. A(n) of a message transmitted by that user.

informs the user that the input has been accepted for

is designed to reduce the possibility that data

authenticates a system user's identity and verifies the integrity

106. A(n) and report is a computer-generated report that reflects the events¾either in detail, summary total, or both¾that were accepted by the system and rejected by the system.


107. regulate transaction processing by calculating control totals at various points in a processing run and subsequently comparing those totals.

108.

are simple counts of the number of documents entered.

109. A count of the number of invoices being paid by all of the customer remittances is a type of batch control total called .

110. A summation of the dollar value of all invoice totals in a batch are called .

111. A(n) is the general term to describe the summation of data that would not normally be totaled except for control purposes.

112. A(n) is a document that is printed as an output of one computer process and is used to capture and input a subsequent transaction.

113. For the control plan events to authorizing individuals.

a workflow facility is used to route business

114. "Confirm input acceptance" addresses the information process control of .


115. In a(n) a computer program sorts the transactions into numerical order; checks the documents against the sequence number range; and reports missing, duplicate, and out-of-range event data.

116. The provides input control in those situations in which the serial numbers are assigned within the organization but are not entered in perfect serial number sequence.

117. A conventional procedure involves a single key that is used both by the sender to encrypt the message and by the receiver to decrypt it.

118. is the control that uses a computer system's workflow facility to route business events to persons authorized to approve those events.

119. To reduce the number of keystrokes required, making data entry quicker and more efficient, we can in response to the entry of identification codes, such as customer numbers, and have the computer retrieve stored data corresponding to those identification codes.

120. When there are programmed edits to control data entry, we would expect to also find to ensure that erroneous items are corrected and resubmitted for processing.

121. We prefer to to ensure that business event data is entered in a timely manner and that personnel who enter the data can confirm its legitimacy and easily correct errors.

122. With prepared and output by the computer.

the data entry clerk compares input batch totals to those


123. The manager of shipping reviews a file of open sales orders¾items to be shipped today¾to determine that all shipments are made in a timely manner. The file of open sales orders is called a(n) .

124. The shipping clerk compares each line on the shipping document to the items to be shipped, called , to ensure that the shipment is accurate.

125. When a clerk enters the identification code for an entity, such as a customer, and the system retrieves data about that entity from the master data, we have the control plan called .

126. For the control plan a data entry clerk enters an identification number, such as a customer number, and then examines the master data record displayed by the computer to determine that the correct identification number has been entered.

127. is a strategy for the capture and entry of event-related data using technology such as OCR, bar codes, RFID, and EDI.

128. A(n) can be applied to prenumbered documents to determine that all documents have been processed and that no extra documents have been processed.

129. A(n) reflects a summarization of any numeric data field within the input document or record, such as item numbers or quantities on a customer order.

130. We by reconciling totals prepared before a computer process has begun to totals prepared at the completion of the computer process. The totals may be prepared and reconciled either manually or by the computer.


131. The control plan computer agreement of batch totals is described in Chapter 9. Below is a description of a particular example of that plan: · · · · ·

Billing clerks batch sources documents and calculate batch totals. The batch of source documents and batch totals are forwarded to the data entry unit of the data center where the batch totals are entered into the computer and written to a batch control totals file (a disk file). As individual source documents are entered, they are recorded in an event data store (disk file). After the batch has been entered the computer prepares batch totals for the records on the event data store and compares these totals with those on the batch control totals file. The computer prepares an Error and Summary Report, which contains details of each batch, together with an indication of whether the totals agreed or disagreed.

Required: Prepare a system flowchart to diagram the above process.

132. The table below lists 8 control plans from Chapter 9 and 3 control goals for the information process. Fill in the table cells, as appropriate to indicate which control plans can accomplish which control goals. Number your entries and describe the reason for your entry (i.e. why the control can accomplish the goal). Some rows (controls) will have more than one entry. The first item has been completed for you as an example.

Control

Input validity

Input completeness

Preformatted screens Online prompting Procedures for rejected inputs Check digit Digital signature Written approvals Populate input screens with master data Confirm input acceptance

1.

Preformatted screens ensure that all data is formatted correctly and that no required fields are skipped.

Input Accuracy 1


133. The following is a list of 10 control plans.

Control Plans A. B. C. D. E. F. G. H. I. J.

Enter data close to the originating source Preformatted screens Confirm input acceptance Check digit Document design Key verification Written approvals Digital signatures Procedures for rejected inputs Compare input data with master data

Required: Listed below are ten system failures that have control implications. On the blank line to the left of each number, insert the capital letter from the list above of the best control plan to prevent the system failure from occurring. If you can't find a control that will prevent the failure, choose a detective or corrective control plan. A letter should be used only once. Answers

SYSTEM FAILUR ES 1.

Clerks at Ludlow Company enter cash receipts in batches using offline networked PCs. The customer number is often miskeyed. As a result, some cash receipts are posted to the wrong account.

2.

At Washington Company shipping notices are entered in batches. Upon entry, the computer performs certain edits to eliminate those notices that have errors. But, many actual shipments never get recorded.

3.

At Janet's Fine Fashions, several sales clerks prepare sales slips during the day. The sales slips are then keyed into the computer at the end of the day. Numerous errors occur because the layout of the sales slips is difficult for the data entry clerk to follow.

4.

Winsted Company recently converted to an online order entry system. Clerks key in customer order data at one of several PCs. In the first week of operations, every sales order produced by the system was missing the data for the customer's "ship to" address.

5.

The computer system at South County Bank received and processed a bogus transaction to transfer funds to a fraudster's bank account in the British West Indies.

6.

Data entry clerks at the Windsor Inc. use offline networked PCs to prepare a variety of inputs for entry into the computer and the computer performs an agreement of batch totals. Recently, a number of errors have been found in key numeric fields. The supervisor would like to implement a control to reduce the transcription errors being made by the clerks.

7.

At Kramer Company, field salespersons call on customers and take customer orders by recording them on sales order forms. The forms are mailed by each salesperson each night to Kramer's central data center for processing. The company has been besieged by customer complaints about how long it takes to receive their orders and about being shipped incorrect goods.

8.

Comet, Inc. recently installed a new cash receipts system. A clerk keys in remittance data through a terminal located in the accounts receivable department. On the first day of operations, several remittances were not accepted for processing. The clerk had no idea that these remittances were not processed.

9.

At Southfield Inc., data entry clerks receive a variety of inputs from many departments throughout the company. In some cases, unauthorized inputs are keyed and entered into the computer.

10.

Clerks in the cash applications section of Charlton Company enter customer payments. The amount being paid is often input incorrectly; it does not agree with the amount due as indicated on the accounts receivable master data.


134. The following is a list of 10 control plans:

Control Plans A. B. C. D. E. F. G. H. I. J.

Populate input screens with master data Cumulative sequence check Turnaround documents Document/record counts Document design Preformatted screens Compare input data with master data Hash total Tickler file Automated data entry


Required: Listed below are ten statements describing a control. On the blank line to the left of each number, insert the capital letter from the list above of the name of the control plan that corresponds to the control description. A letter should be used only once. Answers

CONTR OL DESCRI PTIONS 1.

Helps to achieve the information systems control goal of input accuracy by ensuring that dates are properly entered as MM/DD/YY.

2.

By using a pre-recorded bar code to trigger an event, this control plan ensures effectiveness of operations and improves efficiency by reducing the amount of data that must be input and by improving the speed and productivity of data entry. In addition, this control plan improves input validity, and improves input accuracy.

3.

This control plan could help prevent the entry of inconsistent data elements, such as entering a tax code for a customer to whom sales should be nontaxable.

4.

When the order entry clerk types in the customer number, the system automatically retrieves the customer's name, address, and other standing data from the customer master data. In this way, resources are used more efficiently.

5.

This control plan should prevent a field salesperson from omitting data elements when filling in the sales order form.

6.

In entering a batch of remittance advices into the computer, an operator made several errors in keying the customer identification numbers. However, the errors were detected when the total of the customer ID numbers that were input did not agree with the corresponding total calculated from the source documents.

7.

This control plan helps to identify duplicate, missing, and out-of-range document numbers by comparing input numbers with a previously stored number range.

8.

This batch control total does not help to ensure input accuracy, nor would it detect the fact that one record in a batch was removed and substituted with another.

9.

Bar codes on the items to be shipped are scanned to enter and record the shipment data details. This is quicker and more accurate than typing in each item number.

10.

The manager of the shipping department periodically reviews a file of open sales orders due to be shipped to ensure that all orders are shipped in a timely manner.


135. At Winsted Company the following procedures are used to enter purchase requisitions (PRs). Clerks in the purchasing department receive purchase requisitions (PRs) from departments throughout Winsted's home office. The PRs are handwritten on forms specially designed for this purpose. The clerks enter these into preformatted screens on PCs that are connected to the central computer. After each PR is recorded on the purchase requisition event data store the computer informs the clerk that the PR has been recorded. Once recorded the computer forwards the PRs to appropriate managers who can approve the PRs online. Approving individuals enter their approvals (or denials). PRs that are not approved are sent back to the purchasing clerks for corrective action. Below is the annotated systems flowchart and partially completed control matrix for this process.


Control Goals of the Winsted Purchase Requisition Data Entry Process Control Goals of the Operations Process

Control Goals of the Information Process


Ensure effectiveness of operations:

Recommended control plans Present Controls P-1: Document design. P-2: Preformatted screens. P-3: Confirm input acceptance. P-4: Electronic approvals. P-5: Procedures for rejected inputs.

A

Ensure efficient employment of resources (people, computers)

Ensure security of resources (inventory, purchase order master data)

FF oo rr t ht eh pe u rp cu hr ac sh ea os re d eo rr (i d . e er ., p ua rs ct he ar s ed ra et qa u, ise it n is ou nr se ): i n p u t s, e n s u r e : I IIA V

UC

UA


Possible effectiveness goals include the following:

IV = input validity IC = input completeness A - Ensure timely input of purchase IA = input accuracy requisition data. UC = update completeness See below for a complete explanation of UA = update control plans and cell entries. accuracy

Required: Complete the control matrix by entering the control plan numbers (P-1, P-2, etc.) in the appropriate cells in the control matrix to indicate to which control goal(s) each control plan is directed. Below the matrix describe how each control plan achieves each control goal that you have indicated on the matrix.


Chapter 9--Controlling Information Systems: Business Process and Application Controls Key

1. TRUE 2. FALSE 3. TRUE 4. FALSE 5. FALSE 6. TRUE 7. TRUE 8. TRUE 9. FALSE 10. FALSE 11. TRUE 12. TRUE 13. FALSE 14. FALSE 15. TRUE 16. TRUE 17. FALSE 18. TRUE 19. TRUE 20. TRUE 21. TRUE 22. FALSE 23. FALSE 24. TRUE 25. FALSE 26. TRUE 27. TRUE 28. FALSE


29. TRUE 30. FALSE 31. TRUE 32. FALSE 33. TRUE 34. TRUE 35. TRUE 36. FALSE 37. A 38. B 39. A 40. C 41. C 42. A 43. D 44. B 45. C 46. A 47. B 48. C 49. B 50. A 51. B 52. C 53. D 54. A 55. B 56. C 57. C 58. A 59. A 60. B 61. B 62. B


63. A 64. B 65. B 66. A 67. B 68. D 69. A 70. A 71. A 72. B 73. B 74. D 75. C 76. D 77. D 78. D 79. B 80. B 81. C 82. B 83. D 84. control goals 85. present 86. control matrix 87. effectiveness 88. efficiency 89. security 90. redundancy 91. completeness, accuracy or accuracy, completeness 92. missing control or missing control plan 93. data entry 94. document design 95. Written approval 96. Preformatted screens


97. Online prompting 98. Programmed edit checks or Programmed edits 99. reasonableness 100. Hash totals 101. mathematical accuracy checks 102. check 103. confirm input acceptance 104. key verification 105. digital signature 106. exception, summary or summary, summary 107. Batch control plans 108. Document counts or Record counts or Document/record counts 109. item counts or line counts or item/line counts 110. dollar totals 111. hash total 112. turnaround document 113. electronic approvals 114. input completeness 115. batch sequence check 116. cumulative sequence check 117. data encryption 118. Electronic approvals 119. populate input screens with master data 120. procedures for rejected inputs 121. enter data close to the originating source 122. manual reconciliation of batch totals 123. tickler file 124. one-for-one checking 125. populate input screens with master data 126. compare input data with master data 127. Automated data entry 128. sequence check 129. document hash total or record hash total or document/record hash total 130. agree run-to-run totals


131. 132. Control Preformatted screens Online prompting Procedures for rejected inputs Check digit Digital signature Written approvals Populate input screens with master data Confirm input acceptance

Input validity

Input completeness

3 6 8 9

Input Accuracy 1 2 4 5 7 10

11


1.

Preformatted screens ensure that data is formatted correctly and no required fields are skipped.

2.

Online prompting gives data operators a chance to check their entries before continuing and may provide context-sensitive help.

3.

Correcting and resubmitting data with errors helps ensure that the data entry process is complete and no transactions are missing.

4.

Subjecting corrected and resubmitted data to the same tests it went through the first time helps ensure that all input data is accurate.

5.

When a numerical entry is input, the computer performs a calculation to verify correctness. If the original check digit is not calculated, it indicates that the entry is incorrect and needs to be changed.

6.

Opening the digital signature message with a sender's public key ensures that the signature message (and the related encrypted message) was actually sent by that sender thus ensuring the validity of the message.

7.

Matching the hash total in the signature message with the hash total of the encrypted message ensures that the message was not altered in transmission.

8.

The possibility of invalid events being processed is reduced when written approvals indicating authorization are used.

9.

When the computer displays a master record, such as a vendor master record, when a clerk inputs a vendor number for a purchase, we can be sure that we will be executing a purchase from an authorized vendor, thereby validating the purchase.

10.

When the computer displays a master record, such as a vendor master record, when a clerk inputs a vendor number for a purchase, fewer keystrokes will be required to enter the purchase data, improving input accuracy.

11.

Because the data entry clerk is informed by the computer that an input has been accepted, all inputs are recorded and none are recorded twice.

133. System Failure 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

134. Control Description 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Answer D I E B H F A C G J

Control Plan F C G A E H B D J I


135. Control Goals of the Winsted Purchase Requisition Data Entry Process Control Goals of the Operations Process Ensure effectiveness of operations:

Recommended control plans

Control Goals of the Information Process Ensure efficient employment of resources (people, computers)

A

Ensure security of resources (inventory, purchase order master data)

F For the o purchas re t order h master e data, p ensure: u r c h a s e o r d e r (i .e ., p u r c h a s e r e q u is it i o n s ) i n p u t s, e n s u r e : I IC IA V

Present Controls P-1: Document design.

P-1

P-1

P-1

UC

UA


P-2: Preformatted screens.

P-2

P-2

P-2

P-3: Confirm input acceptance.

P-3

P-4: Electronic approvals.

P-5: Procedures for rejected inputs. Possible effectiveness goals include the following: A - Ensure timely input of purchase requisition data. See below for a complete explanation of control plans and cell entries.

P-4

P 4 P-5

P-5

IV = input validity IC = input completeness IA = input accuracy UC = update completeness UA = update accuracy

Discussion and Explanation of Recommended Control Plans for Winsted Purchase Requisition Data Entry Process P-1:

P-2:

P-3:

P-4:

P-5:

Document design. Effectiveness goal A, efficient employment of resources: A well-designed document can be completed more quickly (effectiveness goal A) and can be prepared and entered into the computer with less effort (efficiency). Purchase requisition input accuracy: We tend to fill in a well-designed document completely and legibly. If a document is legible, data entry errors will occur less frequently. Preformatted screens. Effectiveness goal A, efficient employment of resources: By structuring the data entry process, automatically populating fields, and preventing errors, preformatted screens simplify data input and save time (Effectiveness goal A), allowing a user to input more data over a period of time (efficiency). Purchase requisition input accuracy: As each data field is completed on a preformatted screen, the cursor moves to the next field on the screen, thus preventing the user from omitting any required data set. The data for fields that are automatically populated need not be manually entered, thus reducing input errors. Incorrectly formatted fields are rejected. Confirm input acceptance. Purchase requisition input completeness: By advising the user that input has been accepted, interactive feedback checks help ensure input completeness. Electronic approvals. Security of resources, purchase requisition input validity: By checking to see that approvals are present on all purchase requisitions, we reduce the possibility that invalid (unauthorized) purchase requisitions will be input and that inventory purchased and funds expended without approval. Procedures for rejected inputs. Purchase requisition input completeness and purchase requisition input accuracy: The rejection procedures (i.e., "Error routine not shown" annotations) are designed to ensure that erroneous data not accepted for processing are corrected (accuracy) and resubmitted for processing (completeness).


Chapter 10--The Order Entry/Sales (OE/S) Process Student: 1. The order entry/sales (OE/S) process includes the first four steps in the order-to-cash process: presales activities; sales order processing; picking and packing the goods; and shipping. True False

2. The first step in the order-to-cash process is sales order processing. True False

3. A customer request for goods might take the physical form of a telephone call, an EDI transmission, an entry on a Web site, or a faxed or mailed customer order. True False

4. The OE/S process helps support the decision needs of the accounting department. True False

5. One of the primary functions of the OE/S is to create information flows which support the repetitive work routines of the sales order department, credit department, and shipping department. True False

6. The flow of information from OE/S to marketing managers is an example of horizontal information flows. True False

7. The flow of information from OE/S to the credit department is an example of vertical information flows. True False

8. For companies using enterprise systems, CRM systems often share the same underlying database. True False


9. Data warehousing applications in organizations are usually viewed as being focused on either operational or analytical applications. True False

10. CRM software is designed to manage all the data related to customers, such as marketing, field service, and contact management data. True False

11. Sell-side systems use the Internet to automate and manage corporate vendors and purchases. True False

12. Buy-side systems are designed to allow a company to market, sell, deliver and service goods and services to customers throughout the world via the Internet. True False

13. Sales-force automation software may be used to route calls to a particular sales representative who has previously worked with the customer. True False

14. A customer order triggers the OE/S process. True False

15. Analytical applications, which include data mining, are intended to allow the use of sophisticated statistical and other analytical software to help an organization's members develop insights about customers, processes, and markets. True False

16. If a check of the customer master data shows that the goods requested on a customer order are not in stock, an exception routine called a back order is initiated. True False


17. A packing slip authorizes the warehouse to remove goods from the warehouse and send them to the shipping department. True False

18. A picking ticket is affixed to the inventory package sent to the customer and identifies the customer and the contents of the package. True False

19. Vendor acknowledgements are sent to vendors to notify them that their orders have been accepted and to inform them of the expected delivery date. True False

20. A bill of lading is the document representing the contract between the shipping company and the common carrier. True False

21. The OE/S process sends the sales order notification to the billing department to notify them of a pending shipment. True False

22. If a customer refuses to accept a back order, then the sales event is terminated and the sales order is accepted. True False

23. A customer acknowledgement is sent to the customer to notify him or her of the order's acceptance and the expected shipping date. True False

24. A customer acknowledgement is sent to the billing department to notify them of a pending shipment. True False

25. In the E-R diagram for OE/S, SALES_ORDERS activates the STOCK_PICK. True False


26. In the E-R diagram for OE/S, STOCK_PICK triggers the SALES_INVOICES. True False

27. In the E-R diagram for OE/S, SHIPMENTS generate the SALES_INVOICES. True False

28. The marketing data is a repository of a variety of sales-oriented data, some of which result from recording sales events and some of which originate from activities that do not culminate in completed sales, such as presales activities. True False

29. The inventory master data normally contains standing data about each customer, such as name, billing and ship-to addresses, and telephone number. True False

30. The customer master data is a data store that contains data identifying the particular characteristics of each customer. True False

31. The completed picking ticket file provides an audit trail of authorized inventory transfers made between the warehouse and the shipping department. True False

32. Depending on how the OE/S process is designed, the sales order master data may be updated at least twice¾once when a new sales order is created and later to reflect the shipment of that order. True False

33. Optical character recognition (OCR) devices use light reflection to read differences in code patterns in order to identify a labeled item. True False

34. Bar code readers are used to recognize patterns of handwritten or printed characters. True False


35. Output devices that capture printed images or documents and convert them into electronic digital signals that can be stored in computer media are called scanners. True False

36. When a customer service representative enters data into the OE/S system, the first screen prompt is usually for the customer number. True False

37. A tickler file is one that is reviewed on a current and regular basis for the purpose of taking action to clear the items from that file. True False

38. Preformatted screens in the OE/S process are a control plan that involves the detailed comparison of the individual elements appearing on two source documents. True False

39. One-for-one checking in the OE/S process is a control plan that simplifies the data entry process, and may prevent the customer service representative from omitting data, to fill in certain fields, and reject incorrectly formatted fields to reduce input errors. True False

40. Online prompting in the OE/S process is a control plan that advises the customer service representative to check their data entries for accuracy before moving on. True False

41. Confirm input acceptance in the OE/S process is a control plan that tells the customer service representative that the order has been accepted. True False

42. Customer credit check is a control plan that ensures that the organization protects its resources by dealing only with customers who have demonstrated an ability to satisfy their liabilities. True False


43. Customer Relationship Management (CRM) tools can be used by marketing managers to connect with customers, to learn what they like and don't like, and about new products that they want. True False

44. The OE/S process is part of the A. order-to-cash B. purchase-to-pay C. human resources D. general ledger/financial reporting

process.

45. The OE/S process handles the processing and shipment of a customer order while another process actually bills the customer. With such a configuration, you would not expect the OE/S system to interface directly with the . A. billing/accounts receivable/cash receipts process B. inventory process C. general ledger process D. human resource process

46. The OE/S process includes the first four steps in the order-to-sales process. The order of these four steps is: A. pre-sales activities, sales order processing, picking and packing, shipping B. pre-sales activities, picking and packing, sales order processing, shipping C. pre-sales activities, picking and packing, shipping, sales order processing D. none of the above

47. The primary function of the OE/S process is to create information flows that support: A. decision making of sales personnel B. the key organizational features of the marketing function C. producing financial statements D. decision needs of those who manage various sales and marketing functions

48. In addition to the warehousing function, the three primary departments that you would expect to be part of a typical OE/S process are: A. sales order, shipping, and credit B. sales order, shipping, and accounts payable C. sales order, credit, and accounts payable D. credit, shipping, and accounts payable


49. The ultimate goal of the OE/S process is: A. to ensure accuracy of order entry and sales events B. to ensure increasing sales volume through the OE/S process C. to create value for the customer D. none of the above

50. When the sales order department acknowledges a customer order, it is an example of a: A. vertical information flow B. horizontal information flow C. both vertical and horizontal information flow D. neither vertical nor horizontal information flow

51. When the sales-related data are captured in the sales order department and then the information flows to the managers housed in the marketing department, it is an example of a: A. vertical information flow B. horizontal information flow C. both vertical and horizontal information flow D. neither vertical nor horizontal information flow

52. Which of the following is a horizontal information flow? A. sales order department requests credit approval from credit department B. sales order department acknowledges the order to the customer C. warehousing sends completed picking ticket to shipping D. all of the above are horizontal information flows

53. With companies facing global competition, firms are recognizing that their most important asset is: A. inventory B. employees C. cash D. a happy customer

54. The OE/S process addresses the decision needs of managers of various sales and marketing functions through the use of: A. vertical information flows B. horizontal information flows C. both vertical and horizontal information flows D. neither vertical nor horizontal information flows


55. The grouping of customers into categories based on key characteristics is called: A. itemization B. Identification C. segmentation D. sales-force automation

56. applications in organizations are usually viewed as being focused on either operational or analytical applications. A. Data mining B. Data warehousing C. Data entry D. Market segmentation

57. Analytical applications, which include , are intended to allow the use of sophisticated statistical and other analytical software to help an organization's members develop insights about customers, processes, and markets. A. data mining B. data entry C. e-commerce modules D. market segmentation models

58. systems use the Internet to automate and manage purchases and the vendors from which these purchases are made with the predominate technology being electronic data interchange (EDI). A. Customer relationship management B. Buy-side C. Sell-side D. E-business

59. applications can handle both B2B and B2C business transactions. A. Customer relationship management B. Buy-side C. Sell-side D. E-business


60. The concept behind is to cultivate customer relationships by prospecting, acquiring, servicing, and retaining customers. A. customer relationship management (CRM) systems B. customer self-service (CSS) software C. sales-force automation (SFA) software D. sell-side systems

61. A data flow or event that causes a process to begin is called a: A. Tickler B. Trigger C. Document D. validity check

62. A specific type of reject stub is called a(n): A. exception routine B. summary report C. corrective routine D. normal routine

63. An example of an "exception routine" is a(n): A. back order process B. inventory subroutine C. customer acknowledgement process D. sales order processing process

64. Assuming that we separate the shipping and billing processes, which of the following data stores would you expect to be updated by an OE/S process called execute shipping notice? A. accounts receivable master data B. sales order master data C. inventory master data D. both B and C

65. In a logical DFD for the OE/S process, which of the following data stores is least likely to interact with the process validate sales order? A. general ledger master data B. accounts receivable master data C. marketing data D. inventory master data


66. In a typical OE/S process, validating a sales order likely would involve all of the following processes except: A. checking the customer's credit B. verifying inventory availability C. completing the sales order D. completing the picking ticket

67. A valid shipping notice input is one that is supported by both: A. an approved sales order and a completed picking ticket B. an approved sales order and an actual shipment of goods C. an approved sales order and a customer acknowledgement D. an approved sales order and customer credit verification

68. Assuming that we separate the shipping and billing processes, which of the following data stores provides data to the typical OE/S process but is not updated by the process? A. general ledger master data B. sales order master data C. inventory master data D. customer master data

69. For a typical OE/S process to check a customer's credit, all of the following data stores likely would be consulted except the: A. general ledger master data B. customer master data C. accounts receivable master data D. sales order master data

70. A document that is used when filling a sales order to authorize the movement of goods from a warehouse to shipping is called a: A. shipping order B. packing slip C. picking ticket D. blind authorization


71. At the time that the shipping notice is prepared and disseminated in an OE/S process, to the following entities are notified: A. billing, general ledger, carrier B. customer, carrier, general ledger C. warehouse, customer, billing D. warehouse, carrier, billing

72. At the time that the shipping notice is prepared and disseminated, two data stores within the OE/S process are normally updated. Those two data stores are the: A. customer master data and accounts receivable master data B. accounts receivable master data and sales order master data C. accounts receivable master data and marketing data D. sales order master data and inventory master data

73. Which of the following documents represents a contract between two parties? A. shipping's inventory notification B. packing slip C. customer acknowledgement D. bill of lading

74. Which of the following data stores is designed primarily to serve the vertical information needs of the organization rather than the horizontal information flows? A. inventory master data B. marketing data C. sales order master data D. customer master data

75. Which of the following data is least likely to be stored in the customer master data? A. customer number B. billing address C. ship-to address D. open invoices

76. In an entity-relationship (E-R) diagram for the OE/S process, you would expect that the word trigger would appear in the diamond showing the relationship between which of the following pairs of entities? A. CUSTOMER and SALES ORDER B. CUSTOMER and SHIPMENT C. STOCK PICK and SHIPMENT D. SALES INVOICE and SHIPMENT


77. Bar code readers: A. are devices that use light reflection to read differences in bar code patterns to identify a labeled item. B. are devices used for pattern recognition of handwritten or printed characters. C. are input devices that capture printed images or documents and convert them into electronic digital signals that can be stored on computer media. D. are computer-based systems for capture, storage, retrieval, and presentation of images of objects such as pictures and documents.

78. Which of the following goals is not an example of an operations process goal of the typical OE/S process? A. to provide timely responses to customer inquiries B. to provide timely acknowledgements of customer orders C. to provide timely updates to general ledger accounts D. to provide timely shipments of goods to customers

79. In constructing a control matrix for an OE/S process, the principal data input(s) to the information system likely would be: A. customer inquiries and customer order inputs B. customer inquiries and shipping notice inputs C. customer order and shipping notice inputs D. customer order only

80. The file most important for ensuring validity of customer order inputs is the: A. customer master data B. accounts receivable master data C. marketing data D. completed picking ticket data

81. The control plan preformatted screens is directed primarily toward achieving the information process control goal of ensuring: A. sales order input validity B. sales order input accuracy C. sales order input completeness D. sales order update completeness

82. The control plan confirm input acceptance helps to achieve the sales order input control goal of: A. sales order input validity B. sales order input accuracy C. sales order input completeness D. shipping notice input accuracy


83. In the OE/S process, the document that represents an independent authorization to ship goods to the customer is the: A. bill of lading B. sales order C. customer acknowledgement D. shipping notice

84. In the control matrix of the OE/S process, regarding shipping notice inputs, which of the following control goals is ensured by comparing the shipping notice input to the sales order master data? A. input completeness and input accuracy B. input completeness and input validity C. input validity and input accuracy D. none of the above

85. Digital image processing systems are capable of performing all of the following except: A. capture of data B. storage of data C. retrieval of data D. creation of data

86. The system that enables users of an ERP system to view source documents from any location is: A. electronic data interchange B. local area network C. digital image processing D. electronic commerce

87. The order entry/sales (OE/S) process includes the first four steps in the process.

88. The first step in the OE/S process is typically a data flow from a(n)

.

89. expect convenient and timely access to information about their order from order initiation, through product delivery, and until after the bill had been paid.


90. The OE/S process helps support the decision needs of the functions.

and

91. One of the primary functions of the is to create information flows which support the repetitive work routines of the sales order, shipping, and credit departments.

92. The flow of information from the OE/S process to marketing managers is an example of information flows.

93. The flow of information from OE/S to the credit department is an example of information flows.

94. For companies using enterprise systems, customer relationship management (CRM) systems often share the same underlying .

95. The concept behind prospecting, acquiring, servicing, and retaining customers.

is to cultivate customer relationships by

96. systems use the Internet to automate and manage purchases and the vendors from which these purchases are made.

97. systems are designed to allow a company to market, sell, deliver, and service goods and services to customers throughout the world via the Internet.


98. The buzzword in CRM which means the grouping of customers into categories based on key characteristics is .

99. In the OE/S process, the one input that creates the six outputs of general ledger inventory sales update, sales order notification, bill of lading, completed packing slip, shipping's billing notification, and customer acknowledgement is the .

100. When a source document provides authority for a business activity to occur, the source document is said to the activity.

101. If a check of the inventory master data shows that the goods requested on a customer order are not in stock, an exception routine called a(n) process is initiated.

102. A(n) and send them to the shipping department.

authorizes the warehouse to remove goods from the warehouse

103. A(n) is affixed to the inventory package sent to the customer and identifies the customer and the contents of the package.

104. are sent to customers to notify them that their orders have been accepted and to inform them of the expected shipping date.

105. A(n) company and the carrier.

is the document representing the contract between the shipping


106. The OE/S process sends the notification to the billing/accounts receivable/cash receipts process to notify that process of a pending shipment.

107. When a transaction is terminated because of an error or other exception condition, such as when a customer refuses to accept a back order in the OE/S process, the transaction termination is shown on a DFD by a(n) data flow.

108. In the ER diagram for OE/S, SALES_ORDERS activates

.

109. In the ER diagram for OE/S, STOCK_PICK triggers

.

110. In the ER diagram for OE/S, SHIPMENTS generates

.

111. The data is the repository of a variety of sales-oriented data, some of which result from recording sales events and some of which originate from activities that do not culminate in completed sales, such as presales activities.

112. The master data normally contains standing data about each customer, such as name, address, and telephone number.

113. The been picked, packed, and shipped.

master data is updated to reflect the fact that the goods have


114. are devices that use light reflection to read differences in code patterns in order to identify a labeled item.

115.

is used to recognize patterns of handwritten or printed characters.

116. Input devices that capture printed images or documents and convert them into electronic digital signals that can be stored in computer media are called .

117. A(n) file is one that is reviewed on a current and regular basis for the purpose of taking action to clear the items from that file.

118. One-for-one checking of with the goods ensures that the correct goods are picked from the shelf and that any errors are detected and corrected in a timely manner (e.g., before the goods get to the shipping department).

119. may reduce input errors by populating certain fields and rejecting incorrectly formatted fields, thereby preventing the customer service representative from omitting data or entering data with errors.

120. accuracy before moving on.

advises customer service representatives to check data entries for

121. ensures that the organization protects its resources by dealing only with customers who have demonstrated an ability to satisfy their liabilities.


122. master data contains a record of each item that is stocked in the warehouse or regularly ordered from a vendor.

123. is a control plan that establishes, for shipping personnel, that someone other than warehouse personnel authorized a shipment.

124. segregates duties between the personnel who create the customer record and the personnel who create the sales order.

125. tools can be used by marketing managers to connect with customers, to learn what they like and don't like, and about new products that they want.

126. systems are computer-based systems for the capture, storage, retrieval, and presentation of images of objects such as pictures and documents.


127. TB Figure 10.1 below shows the horizontal perspective of an OE/S process. Functional titles and information flows, depicted as documents, generated or captured by the OE/S process have been omitted from the figured and listed underneath it.

Functiona Information Flows l titles (depicted as documents) (for OE/S structures and entities with which the process interacts) A. Credit department B. Sales order department C. Shipping department D. VP finance E. VP logistics F. B/AR/CR process G. Carrier H. Customer I. General ledger J. Warehouse K. VP marketing

L. M. N. O. P. Q. R. S. T. U. V. W.

Customer order Credit request Credit approval Acknowledgement (to customer) Picking ticket (to warehouse) Completed picking ticket (to shipping) Sales order (to B/AR/CR) Shipping notice (to B/AR/CR) Shipping notice (to sales order dept.) Shipping notice (to carrier) Shipping notice (to general ledger) Sales order (to shipping)


Required: Number your paper from 1 to 23 Match the letter from the list to the appropriate number in TB Figure 10.1.

128. Below is a narrative of the "Validate sales order" portion (i.e., bubble 1.0) of the order entry/sales process. Narrative Description How does the OE/S process then validate a customer order? First, process 1.1 verifies the availability of the requested inventory by consulting the inventory master data. If a sufficient level of inventory is on hand to satisfy the request, the order is forwarded for further processing, as depicted by the data flow "Inventory available order." Conversely, if a customer orders goods that are not in stock, process 1.1 runs a special back order routine. This routine determines the inventory requirement necessary to satisfy the order and then sends the back order request to the purchasing department. This activity is depicted by the "Back order" data flow, which in reality is a specific type of exception routine (i.e., a specific type of reject stub). If the customer refuses to accept a back order, then the sales event is terminated and the order is rejected, as shown by the "Reject" data flow. Information from the order (e.g., sales region, customer demographics, and order characteristics that reflect buying habits) that has potential value to marketing is recorded in the marketing data store. After assuring inventory availability, process 1.2 establishes the customer's existence and then evaluates credit. The credit check adds the amount of the order to accounts receivable balances and open sales orders (i.e., orders about to be receivables), and compare that total to the credit limit. If the customer has exceeded their credit limit, the order is rejected. Upon a successful credit approval, process 1.3 performs the following activities simultaneously: · · ·

Updates the inventory master data to allocate the quantity ordered to the sales order. The inventory balance could actually be reduced at this time to save a later update of the inventory master data. Updates the sales order master data to indicate that a completed sales order has been created. Disseminates the sales order.


Required: From the DFD in TB Figure 10.2 and the narrative description above, explode bubble 1.0 into a lower-level diagram showing the details of that process.


129. Below is a narrative of the "Validate sales order" portion (i.e., bubble 1.0) of the order entry/sales process. Narrative Description How does the OE/S process then validate a customer order? First, process 1.1 verifies the availability of the requested inventory by consulting the inventory master data. If a sufficient level of inventory is on hand to satisfy the request, the order is forwarded for further processing, as depicted by the data flow "Inventory available order." Conversely, if a customer orders goods that are not in stock, process 1.1 runs a special back order routine. This routine determines the inventory requirement necessary to satisfy the order and then sends the back order request to the purchasing department. This activity is depicted by the "Back order" data flow, which in reality is a specific type of exception routine (i.e., a specific type of reject stub). If the customer refuses to accept a back order, then the sales event is terminated and the order is rejected, as shown by the "Reject" data flow. Information from the order (e.g., sales region, customer demographics, and order characteristics that reflect buying habits) that has potential value to marketing is recorded in the marketing data store. After assuring inventory availability, process 1.2 establishes the customer's existence and then evaluates credit. The credit check adds the amount of the order to accounts receivable balances and open sales orders (i.e., orders about to be receivables), and compare that total to the credit limit. If the customer has exceeded their credit limit, the order is rejected. Upon a successful credit approval, process 1.3 performs the following activities simultaneously: · · ·

Updates the inventory master data to allocate the quantity ordered to the sales order. The inventory balance could actually be reduced at this time to save a later update of the inventory master data. Updates the sales order master data to indicate that a completed sales order has been created. Disseminates the sales order.


Required: From the DFD in TB Figure 10.4 and the narrative description above, explode bubble 1.0 into a lower-level diagram showing the details of that process by identifying the words that belong in items 1 to 18 (TB Figure 10.5).



130. Below is the narrative of the "Execute shipping notice" portion (i.e., bubble 3.0) of the order entry/sales process. Narrative Description This narrative describes activities that normally take place in a shipping department. Process 3.1 receives two data flows, namely the completed picking ticket and data retrieved from the sales order master data. The shipping clerk matches the quantity of the goods, the quantity on the picking ticket, and the quantity stored in the sales order master data. If the details agree, the matched sales order is forwarded to process 3.2. If the details of the data flows do not agree, process 3.1 rejects the order and initiates procedures for resolving any discrepancies. When process 3.2 receives a matched sales order from process 3.1, it produces and disseminates notices of the shipment and updates the sales order and inventory master data. The sales order master data is updated to reflect the fact that the goods have been picked, packed, and shipped. The inventory master data is updated to change the quantity allocated for the sales order to an actual shipment, thus reducing the quantity of inventory on hand. We generally expect the dissemination of notices will include the following data flows: · · · ·

Shipping notifies billing to begin the invoicing process. A bill of lading is attached to the outside of the goods being shipped and is given to the carrier. A packing slip is inserted into the goods being shipped and is given to the carrier. The flow "General ledger inventory sales update" notifies the general ledger process that inventory has been sold and the cost of goods sold has increased.


Required: From the DFD in TB Figure 10.6 and the narrative description above, explode bubble 3.0 into a lower-level diagram showing the details of that process.


131. The entity-relationship (E-R) diagram below represents an order entry/sales process, but with the names of certain entities, characteristics of relationships, and relationship cardinalities removed from the diagram. The names omitted are: · · ·

Entities CUSTOMERS INVENTORY SHIPMENTS

· · · · ·

Characteristics of the Relationships activate billed_to generate SALES_RELATIONS trigger

Required: Complete TB Figure 10.8 by: a. Inserting the names from the above lists into the rectangles (entities) or diamonds (characteristics of the relationships), respectively, where they belong b. Inserting a 1 or an N where necessary next to the connecting lines to indicate the cardinality of the relationships



132. The following systems flowchart depicts a portion of the OE/S Process:

Required: Based on the flowchart (TB Figure 10.10):


a.

b.

Complet e the flowchar t by matching the 8 blank items, which are indicated by the letters A through H with the 8 items listed below: 1. Bill of Lading 2. Compare order number and quantities 3. Completed picking ticket (with bar codes) 4. Display sales order 5. Enterprise database 6. Accept shipment 7. Packing Slip 8. Scan bar codes on picking ticket Name the present and missing control plans identifie d with the letters P and M in the flowchar t.


133. The following is a list of 10 control plans.

Control Plans A. B. C. D. E. F. G. H. I. J.

Enter data close to where customer order is received Online prompting Independent shipping authorization Procedures for rejected inputs Preformatted screens Customer credit check One-for-one checking of goods, picking ticket, sales order Populate inputs with master data Review open sales orders (tickler file) Turnaround document (picking ticket with bar codes)

Required: Listed below are ten system failures that have control implications. On the answer line to the left of each system failure, insert the capital letter from the list above of the best control plan to prevent the system failure from occurring. A letter should be used only once. Answers

SYSTEM FAILUR ES 1.

The sales personnel can approve all customer orders.

2.

Any correcting entries to be made by the customer service representative are done at a later time rather than as the data is input into the system. Some customer orders are never corrected and re-entered.

3.

The finished goods warehouse delivers goods to the shipping department, accompanied by the picking ticket. After checking the goods against the picking ticket, the shipping employee signs the picking ticket and gives it to the warehouse employee. Then the shipping department prepares a three-part shipping notice, one copy of which serves as the packing slip. A recent audit discovered that a dishonest warehouse employee had been forging picking ticket documents, thereby having goods shipped to an accomplice.

4.

Customer service representatives record customer orders on prenumbered order forms, and then forward the forms to the corporate office in Orlando for processing. J.B. Wrigley, one of Mandates top salesmen, had a very good week; he mailed 55 customer orders to the corporate office on Friday afternoon. Unfortunately, they were misplaced in the mail and did not reach Orlando until three weeks later. Needless to say, those 55 customers were more than a little displeased at the amount of time that Mandate took to fill their orders.

5.

Customer service representative can manually key in order data at one of many PCs. In the first two weeks of operation, every sales order produced by the computer was missing a "ship-to" address.

6.

The customer service representative can enter a customer code with no matching customer master data and no authorized customer. Therefore, it is possible to make invalid entries into the system.

7.

Proper comparisons are not made to ensure that the shipping notice inputs are represented by an actual shipment of goods.

8.

The OE/S system does not advise the customer service representative to check the data entries before moving on to the next order.

9.

Customers have complained that their invoices are not correct. The amount of goods received does not correspond to the number of items on the invoices. After some investigation it was determined that shipping clerks have made errors in recording the amount shipped.

10.

Several shipments have not been made in a timely manner.


134. TB Figure 10.11 is the annotated systems flowchart for the order entry/sales process. TB Figure 10.12 is the related control matrix. Following the control matrix is a description of the first control plan, P-1. Required: Using the format shown for control plan P-1, write descriptions for control plans P-2, P-10, P-14, P-15, and M-1.

Contr ol Goals of the OE/S Busine ss Proces s


Recommended control plans

Present Controls P-1: Enter customer order close to where the order is received P-2: Customer credit check P-3: Populate input screens with master data P-4: Programmed edit checks P-5: Compare input data with master data P-6: Preformatted screens P-7: Online prompting P-8: Procedures for rejected inputs P-9: Confirm input acceptance P-10: One-for-one checking of picking ticket with the goods TB Figure 10.12 (part 1)

Contro Contro l Goals l Goals of the of the Operati Inform ons ation Proces Proces s s Ensure Ensure Ensure For sales order effecti efficie security inputs (i.e., veness nt of customer of employ resources orders), operati ment (inventory ensure: ons: of , resourc customer es master (people data) , comput ers) A B C P-1

P-1

For sales order and inventory master data, ensure:

For For shippin sales g order notice and inputs invento (i.e., ry shipme master nt data, data), ensure: ensure:

IV

P-1

P-2

P-2

P-2

P-3

P-3

IC

IA

P-1

P-1

P-3

P-3

P-3

P-4

P-4

P-4

P-5

P-5

P-5

P-6

P-6

P-6

P-6

P-7

P-7

P-7

P-7

P-8

P-8

UC

UA

IV

P-8

P-8

P-4 P-5

P-5

P-8

P-10

IA

P-3

P-8

P-9 P-10

IC

P-10

P-9 P-10

P-10

UC

UA


Recommended control plans

Contr ol Goals of the OE/S Busine ss Proces s Contro Contro l Goals l Goals of the of the Operati Inform ons ation Proces Proces s s Ensure Ensure Ensure For sales order effecti efficie security inputs (i.e., veness nt of customer of employ resources orders), operati ment (inventory ensure: ons: of , resourc customer es master (people data) , comput ers) A B C

Present Controls P-11: Enter shipment data in shipping P-12: Turnaround document P-3: Automated data entry P-14: Independent shipping authorizatio n P-15: One-for-one checking of goods, picking ticket, sales order Missing Controls M-1: Independent M-1 customer master data maintenanc e M-2: Review open sales orders (tickler file)

P-11

P-11

P-12

P-12

P-13

P-13

For sales order and inventory master data, ensure:

IV

IC

IA

UC

UA

IV

IC

IA

P-11 P-11

P-12

P-12 P-13

P-14

P-14

P-15

P-15

M-1

M-2

For For shippin sales g order notice and inputs invento (i.e., ry shipme master nt data, data), ensure: ensure:

P-15

M-1

M-2

UC

UA


Possible effectiveness IV = goals include the input following: validit A¾Provide timely y acknowledgement of IC = customer orders. input B¾Provide assurance comple of customer's teness creditworthiness. IA = C¾Provide timely input shipment of goods to accura customers. cy UC = update comple teness UA = update accura cy TB Figure 10.11 (part 2)

P-1: Enter customer order close to where the order is received. · Effectiveness goals A and C, efficient employment of resources: Use of this strategy places CSRs in a position to process customer orders immediately, and being familiar with the orders allows the CSRs to input the orders more quickly, which leads to timely acknowledgements and shipments and more orders processed by each representative (efficiency). · Sales order input completeness: By having the CSRs enter the sales data rather than forwarding to a data entry function, the risk of orders getting lost should be reduced. · Sales order input accuracy: Because CSRs are familiar with the type of data being entered and can correct any input errors "on the spot," input accuracy should be improved.


Chapter 10--The Order Entry/Sales (OE/S) Process Key

1. TRUE 2. FALSE 3. TRUE 4. FALSE 5. TRUE 6. FALSE 7. FALSE 8. TRUE 9. TRUE 10. TRUE 11. FALSE 12. FALSE 13. TRUE 14. TRUE 15. TRUE 16. FALSE 17. FALSE 18. FALSE 19. FALSE 20. TRUE 21. TRUE 22. FALSE 23. TRUE 24. FALSE 25. TRUE 26. FALSE 27. TRUE 28. TRUE 29. FALSE


30. TRUE 31. TRUE 32. TRUE 33. FALSE 34. FALSE 35. FALSE 36. TRUE 37. TRUE 38. FALSE 39. FALSE 40. TRUE 41. TRUE 42. TRUE 43. FALSE 44. A 45. D 46. A 47. D 48. A 49. C 50. B 51. A 52. D 53. D 54. C 55. C 56. B 57. A 58. B 59. C 60. A 61. B 62. A 63. A


64. D 65. A 66. D 67. B 68. D 69. A 70. C 71. C 72. D 73. D 74. B 75. D 76. C 77. A 78. C 79. C 80. A 81. B 82. C 83. B 84. C 85. D 86. C 87. order-to-cash 88. customer 89. Customers 90. sales, marketing or marketing, sales 91. order entry/sales (OE/S) process or order entry/sales process or OE/s process 92. vertical 93. horizontal 94. database 95. customer relationship management (CRM) or customer relationship management or CRM 96. Buy-side 97. Sell-side


98. segmentation 99. customer order 100. trigger 101. back order 102. picking ticket 103. packing slip 104. Customer acknowledgements 105. bill of lading 106. sales order 107. reject 108. STOCK_PICK 109. SHIPMENTS 110. SALES_INVOICES 111. marketing 112. customer 113. sales order 114. Bar code readers 115. Optical character recognition or Optical character recognition (OCR) or OCR 116. scanners 117. tickler 118. picking tickets 119. Preformatted screens 120. Online prompting 121. Customer credit check 122. Inventory 123. Independent shipping authorization 124. Independent customer master data maintenance 125. Web 2.0 126. Digital image processing 127. 1. 2. 3. 4. 5. 6. 7. 8.

H L O G K B T U

9. 10. 11. 12. 13. 14. 15. 16.

M N R D A F I P

17. 18. 19. 20. 21. 22. 23.

W S V E J Q C


128. 129. NOTE TO INSTRUCTORS: This question is similar to Problem 2 (in the original banks) except that it asks students to identify the missing pieces instead of drawing Diagram 1. 1. 2. 3. 4. 5. 6. 7. 8. 9.

Customer order 1.1 Verify inventory availability Customer master data Sales order master data 1.3 Complete sales order Customer acknowledgement Sales order notification Marketing data Inventory available order

10. 11. 12. 13. 14. 15. 16. 17. 18.

Accepted order Picking ticket 1.2 Check credit Inventory master data Backorder Reject Inventory master data Accounts receivable master data Reject


130.

131.


132. a.

b.

133. 1. 2. 3. 4. 5.

Missing Item A B C D E F G H

Item Description 5 4 3 8 2 6 1 or 7 1 or 7

The control plans from above are: P-2 Customer credit check P-3 Populate input screens with master data P-4 Programmed edit checks P-9 Confirm input acceptance P-11 Enter shipment data in shipping P-12 Turnaround document P-13 Automated data entry P-14 Independent shipping authorization P-15 One-for-one checking of goods, picking ticket, sales order M-1 Independent customer master data maintenance M-2 Review open sales orders (tickler file)

F D C A E

6. 7. 8. 9. 10.

H G B J I


134. P-2: Custome r credit check. · Effectiveness goal B: The credit check is performed by ascertaining that the amount of the customer order (plus the amount of any open orders and the amount of any outstanding receivables balance) falls within the credit limit established by the credit department. If the request falls outside the limit, then the control terminates the sale. · Security of resources: Termination of orders exceeding credit limits ensures that the organization protects its resources by dealing only with customers who have demonstrated an ability to satisfy their liabilities. · Sales order input validity: Valid sales orders include those that fall within authorized credit limits (i.e., there is a reasonable expectation of payment). P-10: One-forone checking of picking tickets with the goods. · Effectiveness goal C, efficient employment of resources: By comparing the goods to the picking ticket (and correcting any picking errors) in the warehouse, rather than later in shipping, we can process shipments in a more timely manner and more efficiently (the warehouse clerk is in a better position to correct picking errors than is the shipping clerk). · Security of resources: By correcting picking errors, we ensure that only goods that were ordered leave the warehouse. · Shipping notice input validity, shipping notice input accuracy: The shipping clerk sends only the quantity of goods that were on the picking ticket, thus ensuring that the goods entered are shipments that will be valid and accurate. P-14: Independ ent shipping authoriz ation. · Security of resources: The system provides the shipping department with an independent authorization (i.e., an open sales order in the enterprise database that was created by the CSR) to ship inventory to a customer. In addition, the plan calls for the system to provide an independent authorization (i.e., a picking ticket) to the warehouse to pick goods and send them to the shipping department. · Shipping notice input validity: The shipping department will not record a shipment unless it has received independent authorization to do so. This independent authorization comes in the form of picking tickets and the open sales order executed by independent functions, the warehouse and the CSR. P-15: One-forone checking of goods, picking ticket, sales order. · Security of resources, shipping notice input validity: By comparing data on the sales order master data with the data on the picking ticket and then comparing these data sets to the actual goods being shipped, this plan ascertains that inventory shipments have been authorized and represent an actual shipment of goods. · Shipping notice input accuracy: By comparing such items as item numbers, quantities, and customer identification, we can ensure that the input of shipping data is accurate. M-1: Independ ent customer master data maintena nce.


Note: We are assumin g that this control is missing, even though we are told that there is a credit check and that credit rejection procedur es are initiated. · Effectiveness goal B: Only personnel in the credit department, a function that is separate from the sales department, should add new customers to the customer master data. · Security of resources: By precluding sales being made to customers who may not be creditworthy, the organization helps to ensure the security of its resources. · Sales order input validity: Valid sales orders include those that are made to customers for whom management has provided prior authorization. This is accomplished here by having the records entered by the credit department.


Chapter 11--The Billing/Accounts Receivable/Cash Receipts (B/AR/CR) Process Student: 1. The B/AR/CR process completes the order to cash process by accomplishing the activities of billing customers, managing customer accounts, and securing payment for goods and services rendered. True False

2. Recording B/AR/CR event data is generally the responsibility of the treasury department, which typically reports to the controller function. True False

3. Although both the treasurer and controller functions report to the VP of Finance, for good internal control, these functions should be segregated. True False

4. The credit department uses accounts receivable master data to complete several of their activities. True False

5. The goal for treasurers, who are responsible for managing an organization's cash resources, is to make funds available so that they can be used to acquire revenue-generating assets, be invested to earn interest, or be used to reduce debt, thus saving interest charges. True False

6. Float, when applied to cash receipts, is the time between payment by customer and the availability of funds on deposit and available for use. True False

7. Funds on deposit and available for use are known as good funds. True False


8. The AR master file address is a postal address, maintained by the firm's bank, which is used solely for the purpose of collecting checks. True False

9. Database systems are Internet based systems for sending bills/invoices to customers and receiving the customer payment electronically. True False

10. An invoice is a business document¾either paper or electronic transmission¾used to notify the customer of an obligation to pay the seller for merchandise which was ordered and shipped. True False

11. A purchasing statement is a business document designed to inform the payee of the invoices or other items being paid. True False

12. The accounts receivable master data is a repository of all unpaid invoices issued by an organization and awaiting final disposition. True False

13. The sales event data store contains invoice records. True False

14. Electronic bill presentment and payment (EBPP) systems are B2B systems that use a Web site to post customers' bills and to receive their electronic payments. True False

15. The three types of accounts receivable systems discussed in the text are the lockbox, balance-forward, and open-item systems. True False


16. In a balance-forward accounts receivable system, customer statements display previous balance, payments, and balance forward to which are added any new charges to derive the total balance due. True False

17. In an open-item accounts receivable system, customer statements display invoices (new or settled in the current period), along with payment details. True False

18. In a pre-billing system, invoices are prepared after the goods have been shipped and the sales order notification has been matched to the shipping's billing notification. True False

19. In a post-billing system, invoices are prepared upon acceptance of the customer order. True False

20. The acronym EFT stands for electronic funds transfer. True False

21. The acronym ACH stands for automated clearing house. True False

22. A credit card system is better at reducing float time for the collector than a debit card system. True False

23. In an open-item system, accounts receivable records consist of a customer's current balance due, past-due balance, and the finance charges and payments related to the account. True False

24. The B/AR/CR system supports the repetitive work routines of the credit department, the cashier, and the accounts receivable department. True False


25. A debit card is a method of payment whereby a third party, for a fee, removes from the collector the risk of non-collection of the account receivable. True False

26. A credit card is a form of payment authorizing the collector to transfer funds electronically from the payer's bank account to the collector's bank account. True False

27. Forced vacations is the only control procedure that can be used to help prevent or detect lapping. True False

28. The ACH network electronically transfers funds by crediting the collector's bank account and debiting the payer's bank account for the amount of a payment. True False

29. The payment event data contains the details of each payment received. True False

30. The stub attached to the customer statement is also known as a turnaround document. True False

31. The accounts receivable master data is created as sales returns, bad debt write-offs, estimated doubtful accounts, or similar adjustments are processed. True False

32. A lockbox is a postal address maintained by a third party¾typically a bank¾which is used solely for the purpose of collecting checks. True False

33. EFT includes wire transfers, credit and debit card processing, as well as payments made via the ACH Network. True False


34. An electronic bill presentment and payment (EBPP) system is a B2C system that uses a Web site to post customer bills and to receive electronic payments. True False

35. With the biller direct method of an electronic bill presentment and payment (EBPP) system, a company posts its bills/invoices to its own Web site (or to a Web site hosted by a third party) and sends an e-mail notification to its customers telling them that their bill has been posted. True False

36. With the consolidation/aggregation method of an electronic bill presentment and payment (EBPP) system, a company's bills are posted, along with bills from other companies, to a Web site hosted by a third party. Customers then go to that site to pay bills from a number of companies. True False

37. As discussed in the text, the functions of the B/AR/CR process: A. is identical to those of the order entry/sales process B. supports the problem-solving processes of marketing managers C. collects amounts due from customers D. is unrelated to the functions of the order entry/sales process

38. According to the concept of segregation of duties, which of the following managers should report to the controller rather than to the treasurer? A. credit department manager B. accounts receivable department manager C. cashier D. investments manager

39. In an organization in which the OE/S and B/AR/CR processes are separate processes, the B/AR/CR process usually accomplishes all of the following activities except: A. picking goods in the warehouse B. billing customers C. managing customer accounts D. securing payment of customer accounts


40. Which of the following pairs of functions would you expect might report directly to the vice president of finance? A. credit department and controller B. shipping department and controller C. accounts receivable department and treasurer D. treasurer and controller

41. Which of the following statements regarding Check 21 is false? A. It allows banks to exchange checks electronically. B. Before this system, paper checks were flown around the country from bank-to-bank to complete the check-clearing process. C. It requires that banks exchange check images. D. It significantly reduced float.

42. Which of the following process bubbles (i.e., activities) would you not expect to see in the logical DFD for a B/AR/CR process? A. perform billing B. requisition inventory C. receive customer payment D. manage customer accounts

43. Which of the following normally would trigger the billing process in a B/AR/CR process? A. remittance advice B. shipping notice C. picking ticket D. customer acknowledgment

44. Which of the following normally would trigger the B/AR/CR process to record a customer payment? A. credit memo B. remittance advice C. deposit slip D. notice to the general ledger to record a cash receipt

45. The principal master data that you would expect to see in a B/AR/CR process is the: A. sales order B. shipping notifications C. sales journal D. accounts receivable


46. In a B/AR/CR process, which of the following data stores is least likely to interact with a process called "perform billing"? A. vendor master data B. customer master data C. accounts receivable master data D. sales event data

47. In a logical DFD for a B/AR/CR process, which of the following data stores would you expect to interact with a process called "manage customer accounts"? A. inventory master data B. accounts receivable master data C. sales event data D. cash receipts event data

48. In a logical DFD for a B/AR/CR process, you would expect that a credit memo would be sent by the B/AR/CR process to the customer from which of the following processes? A. perform billing B. manage customer accounts C. receive payment D. validate sales order

49. Inputs to the B/AR/CR process normally could include all of the following except: A. a copy of the sales order sent by the sales order function to the billing function B. a shipping notice sent by the shipping function to the billing function C. customer acknowledgement D. remittance advice

50. In general, adjustments to customer balances in the accounts receivable master data will be necessary for all of the following except: A. sales returns and allowances B. reversals of mispostings and other errors C. bad debt write-offs D. estimates of uncollectible accounts

51. An invoice record usually contains all of the following elements except: A. the customer's credit limit B. customer's identification C. items and quantities billed D. invoice date


52. In an entity-relationship (E-R) diagram for the B/AR/CR process, you would expect that the word trigger would appear between the boxes for? A. CUSTOMER and SHIPMENT B. CUSTOMER and SALES INVOICE C. STOCK PICK and SHIPMENTS D. SALES INVOICE and SHIPMENT

53. A company using a centralized database approach might not maintain a relational table for ACCOUNTS RECEIVABLE. Rather, accounts receivable balances at any point in time could be computed as the difference between the relations for which of the following continuous events? A. SHIPMENTS and SALES_INVOICES B. SALES_INVOICES and CASH_RECEIPTS C. SHIPMENTS and CASH_RECEIPTS D. CUSTOMER and SALES_INVOICES

54. One type of accounts receivable system is balance-forward, the other is: A. debit card system B. Automated Clearing House system C. Electronic Funds Transfer system D. open-item system

55. In a pre-billing system, invoices are prepared: A. immediately upon acceptance of a customer order B. when there is to be a delay between the time that the order is accepted and the time it is shipped C. where inventory balances can be determined only through physical count D. to improve customer relations

56. In a fraud scheme known as , the perpetrator attempts to cover the theft of cash received from customer A by applying cash collected from customer B to A's account, then applying a receipt from C to B's account, and so forth. A. Kiting B. lapping C. schmoozing D. hacking


57. Deposit slips are usually generated by the B/AR/CR process: A. at the time invoices are prepared B. by manual procedures C. electronically D. as part of processing cash receipts

58. Typically, the operations process goals of the B/AR/CR: A. vary, depending on the organization and its particular view of these processes B. remain the same for all organizations C. vary inversely with the information process goals D. are the same as the information process goals

59. Which of the following control plans is most likely to appear in the input validity and input accuracy columns, but not in the input completeness column of a control matrix for the billing process? A. independent billing authorization B. reconcile input and output batch totals C. check for authorized prices, term, freight, and discounts D. procedures for rejected inputs

60. For the cash receipts process, the control plan turnaround documents helps to achieve which of the following pairs of control goals? A. ensure input validity and ensure input completeness B. ensure efficient employment of resources and ensure input accuracy C. ensure input completeness and ensure input accuracy D. ensure security of resources and ensure input accuracy

61. In the cash receipts process, the control plan of immediately endorsing incoming checks is designed to achieve the control goal of: A. ensure the timely deposit of cash receipts B. ensure security of the cash asset C. ensure cash receipts input accuracy D. ensure cash receipts input completeness

62. In the billing process, the control plan of review shipped not billed sales orders (tickler file) helps to ensure: A. effectiveness of operations (timely billing) B. efficient employment of resources C. security of resources D. input accuracy


63. The B/AR/CR process comprises three different but related processes¾namely, billing, accounts receivable, and cash receipts. Which of the following would not be an operations process goal for these three processes? A. ensure effectiveness of operations B. ensure AR master data update accuracy C. ensure efficient employment of resources D. ensure security of resources

64. A remittance advice generally would be recorded in which of the following pairs of data stores? A. customer master data and accounts receivable master data B. sales event data and accounts receivable master data C. accounts receivable adjustments data and accounts receivable master data D. cash receipts data and accounts receivable master data

65. Digital images: A. help reduce paper in the B/AR/CR system B. may be scans of checks C. may be scans of remittance advices D. all of the above

66. Which of the following statements is false? A. The typical B/AR/CR system assists in preparing internal and external reports. B. Cash receipts can be accelerated by using some form of EFT. C. The two types of adjustments that commonly result from a periodic review of the aging details of customer account balances are a recurring entry for estimated bad debts and a bad debt write-off. D. Cash receipts events data are comprised of one or more invoice records.

67. Which of the following statements is true? A. In a pre-billing system, invoices are prepared after the goods have been shipped and the sales order notification has been matched to the shipping's billing notification. B. In a post-billing system, invoices are prepared upon acceptance of the customer order. C. Of the two types of billing systems discussed in the text, the pre-billing system requires the more accurate inventory records. D. Of the two types of billing systems discussed in the text, the pre-billing system is appropriate in situations where there is a significant delay between acceptance of the customer's order and the subsequent shipment.


68. Which of the following statements is false? A. The check and remittance advice trigger the receive payment process. B. A bank lockbox provides more protection for cash than a system where cash receipts are mailed to the payee company and then deposited. C. Good funds are funds on deposit and available for use. D. From the standpoint of reducing the collector's float, a customer check is a better payment method than a debit card.

69. The B/AR/CR process completes the: A. billing process B. production process C. order-to-cash process D. inventory process

70. Which of the following is not part of the horizontal information flows of the B/AR/CR process? A. accounts receivable aging report B. customer payment C. bank deposit D. customer invoice

71. Which of the following is most commonly associated with the treasury function? A. recording of event data B. security of funds C. reporting of results of business events D. maintaining accounting records

72. Which of the following segregation of duties is not required for the B/AR/CR business process controls to be effective? A. price authorization and billing B. treasury and controllership C. bank reconciliation and cash receipts D. all of these are required for effective control

73. Placing a customer's bills on a company's own Web site and sending an e-mail telling the customer that his or her bill is there is called: A. electronic funds transfer B. electronic bill presentment C. electronic bill payment D. electronic document management


74. The accounts receivable system in which all the accounts receivable master data contains individual open invoices, against which payments and other adjustments are applied: A. pre-billing system B. open-item system C. balance-forward system D. post-billing system

75. The accounts receivable system typically used by utilities is the: A. pre-billing system B. open-item system C. balance-forward system D. post-billing system

76. Quantities of items shipped to a customer would typically be found in the relational table for: A. CUSTOMERS B. SALES_RELATIONS C. BANKS D. DEPOSITS

77. The billing system in which the invoice is prepared after goods have been shipped and the sales order notification has been matched to shipping's billing notification is called a(n): A. post-billing system B. open-item system C. pre-billing system D. balance-forward system

78. A billing system that can be used when there is little or no delay between the receipt of the customer order and the shipment of the goods is a: A. post-billing system B. open-item system C. balance-forward system D. pre-billing system

79. The technology that allows information on documents to be converted into machine-readable data through a scanner is called a(n): A. OCR B. MICR C. bar code reader D. Digitizer


80. An overall management objective is to: A. minimize the number of sales transactions B. minimize the total amount of accounts receivable C. minimize the time from the beginning of the selling process to the end of the cash collections process D. maximize the amount of float

81. The cash receipts process can be accelerated by using the ACH network because it is: A. an immediate process B. a periodic process C. a type of EFT process D. a batch process

82. A form of fraud in which the payments made by one customer are systematically applied to the account of another is called: A. lapping B. malfeasance C. pre-posting D. knitting

83. In the billing function described in the text, the control plan that contributes to effective operations is: A. edit the shipping notification for accuracy B. independent billing authorization C. compare input shipping notices to sales order master data D. review shipped not billed sales orders (tickler file)

84. Which control is most effective in contributing to the goal of ensure input accuracy in the billing function? A. compare input shipping notices to sales order master data B. batch sequence checks C. confirm input acceptance D. review shipped not billed sales orders (tickler file)

85. Which control plan for the cash receipts function has as its primary control goal to ensure security of resources? A. reconcile bank account regularly. B. enter cash receipts close to where cash is received. C. immediately endorse incoming checks. D. one-to-one checking of deposit slips and checks.


86. The control independent billing authorization ensures that bills: A. are accurate B. are for goods that were picked in the warehouse C. are for goods actually ordered by the customer D. have authorized prices

87. A customer is instructed to send his remittance advice and check to a bank's postal address. This method for collecting customer cash receipts is called: A. electronic funds transfer B. automated clearing house C. Check 21 D. Lockbox

88. To reduce the cost of collecting its accounts receivable, a company sells its accounts receivable to a financial organization. The service is called: A. collection agency advance B. lock-boxing C. Factoring D. Funding

89. The B/AR/CR process completes the order to cash process by accomplishing the activities of: , managing customer accounts, and securing payment for goods or services rendered.

90. Recording B/AR/CR event data is generally the responsibility of the accounts receivable department, which for good internal control typically reports to the function.

91. In the organization structure shown in the text, although both report to the VP of Finance, the and functions should be segregated.

92. Organizations should monitor timely manner.

to ensure that cash is received in a


93. There are two types of electronic bill presentment and payment (EBPP) systems the method and the consolidation/aggregation method.

94. , when applied to cash receipts, is the time between the payment by a customer and the availability of funds on deposit and available for use.

95. Funds on deposit and available for use are known as

funds.

96. A(n) is a postal address, maintained by a third party¾typically a bank¾which is used solely for the purpose of collecting checks.

97. systems are B2C systems that use a Web site to post customers' bills and to receive their electronic payments.

98. A(n) is a business document used to notify the customer of an obligation to pay the seller for merchandise which was ordered and shipped.

99. A(n) the items being paid.

is a business document used by the payer to notify the payee of

100. The organization and awaiting final disposition.

data is a repository of all unpaid invoices issued by an

101. The

data store contains invoice records.


102. Organizations should reconcile their valid deposits are recorded correctly.

on a regular basis to ensure that

103. The two types of accounts receivable systems discussed in the text are the balance-forward and systems.

104. In a(n) accounts receivable system, accounts receivable records consist of a customer's balance, categorized as current and past due, and current account activity, including such items as current charges, finance charges for past-due balances, and payments.

105. In a(n) accounts receivable system, the customer statement displays invoices (new or settled in the current period), along with payment details.

106. In a(n) billing system, invoices are prepared after the goods have been shipped and the sales order notification has been matched to the shipping's billing notification.

107. In a(n) customer order.

billing system, invoices are prepared upon acceptance of the

108. The acronym ACH stands for

109. The acronym EFT stands for

110. When customers pay with a(n)

.

.

card, float is eliminated.


111. The process supports the repetitive work routines of the credit department, the cashier, and the accounts receivable department.

112. The Check Clearing for the 21st Century Act called exchange check images electronically.

allows banks to

113. The type of accounts receivable systems is appropriate in situations where invoices are prepared and sent for each sale (i.e., each shipment), and the customer typically makes payments for specific invoices when those invoices are due.

114. A(n) is a form of payment authorizing the collector to transfer funds electronically from the payer's bank account to the collector's bank account.

115. is a fraud resulting from the improper segregation of duties between the functions of handling cash and recording cash receipt events.

116. The data is created as sales returns, bad debt write-offs, estimated doubtful accounts, or similar adjustments are processed.

117. The network is one of the earliest and most prominent methods for EFT in which the collector's bank account is credited and the payer's bank account is debited for the amount of a payment.

118. The data store contains the details of each payment as reflected on the remittance advice (RA) accompanying a payment.


119. Often times a stub is attached to the customer statement. This stub is also known as a(n) document.

120. Electric and gas utility companies typically use the receivable system.

121. The control plan shipment is supported by an actual sales order.

type of accounts

establishes for the billing personnel that the

122. The control plan ensures that invoices, accounts receivable, and revenue reflect prices, terms, freight, and discounts authorized by management.

123. The control plan assumes that there is a segregation of duties between those who approve prices and those involved in the selling function.

124. The control plan controls the billing and cash receipts functions by asking the customer to review open invoices to determine that they are valid and accurate.

125. To help prevent incoming cash receipts from being fraudulently misappropriated, an organization should .

126. An organization can accelerate cash deposits and prevent lapping by .


127. Below is the narrative of the "Perform billing" portion (i.e., bubble 1.0) of the B/AR/CR process. Narrative Description When the OE/S process produces a sales order, it notifies the B/AR/CR process to that effect. This is the flow "Sales order notification." When triggered by the data flow, "Shipping's billing notification" (i.e., the shipping notice), process 1.1 validates the sale by comparing the details on the sales order notification to those shown on shipping's billing notification. If discrepancies are noted, the shipping notice is rejected, i.e. a reject stub. Rejected notices are later processed through a separate exception routine. If the data flows match, process 1.1 sends a validated shipping notification to process 1.2. Process 1.2 then performs the following actions: · · · · ·

Obtains from the customer master data certain standing data which is needed to produce the invoice. Creates the invoice and sends it to the customer. Updates the accounts receivable master data. Adds an invoice to the sales event data (i.e., the sales journal). Notifies the general ledger process that a sale has occurred (GL invoice update).


Required: From the DFD in TB Figure 11.1 and the narrative description above, explode bubble 1.0 into a lower-level diagram showing the details of that process.


128. Below is the narrative of the "Manage customer accounts" portion (i.e., bubble 2.0) of the B/AR/CR process. Narrative Description Processes 2.1 through 2.3 relate to sales returns adjustments. This process begins when there is notification from the receiving department that goods have been returned by a customer. Subprocess 2.1 obtains data from the accounts receivable master data to validate the return. If the sales return is not valid, it will be rejected (see Reject stub) and processed through a separate exception routine. If the sales return is valid, it is sent to subprocess 2.2 where a credit memo is prepared and sent to the customer, and the accounts receivable master data is updated to reflect the credit. At the same time, the validated sales return is sent to subprocess 2.3 where a journal voucher is prepared, which is used to create a record in the AR adjustments event data store (i.e., the journal), and the general ledger is notified that a credit memo has been issued. This results in updates to sales returns and allowances and to AR. Process 2.4 is triggered by a periodic review of aging details obtained from the accounts receivable master data. The aging details would be used to identify and follow up on late-paying customer accounts. One of two types of adjustments might result from this review: · ·

The recurring adjusting entry for estimated bad debts. The periodic write-off of "definitely worthless" customer accounts.


Like process 2.4, bubble 2.5, "Prepare customer statements," also is triggered by a periodic event that recurs at specified intervals, often on a monthly basis in practice. Details of unpaid invoices are extracted from the accounts receivable master data and are summarized in a statement of account that is mailed (or sent electronically) to customers. Required: From the DFD in TB Figure 11.3 and the narrative description above, explode bubble 2.0 into a lower-level diagram showing the details of that process.


129. Below is the narrative of the "Manage customer accounts" portion (i.e., bubble 2.0) of the B/AR/CR process. Narrative Description Processes 2.1 through 2.3 relate to sales returns adjustments. This process begins when there is notification from the receiving department that goods have been returned by a customer. Subprocess 2.1 obtains data from the accounts receivable master data to validate the return. If the sales return is not valid, it will be rejected (see Reject stub) and processed through a separate exception routine. If the sales return is valid, it is sent to subprocess 2.2 where a credit memo is prepared and sent to the customer, and the accounts receivable master data is updated to reflect the credit. At the same time, the validated sales return is sent to subprocess 2.3 where a journal voucher is prepared, which is used to create a record in the AR adjustments event data store (i.e., the journal), and the general ledger is notified that a credit memo has been issued. This results in updates to sales returns and allowances and to AR. Process 2.4 is triggered by a periodic review of aging details obtained from the accounts receivable master data. The aging details would be used to identify and follow up on late-paying customer accounts. One of two types of adjustments might result from this review: · ·

The recurring adjusting entry for estimated bad debts. The periodic write-off of "definitely worthless" customer accounts.


Like process 2.4, bubble 2.5, "Prepare customer statements," also is triggered by a periodic event that recurs at specified intervals, often on a monthly basis in practice. Details of unpaid invoices are extracted from the accounts receivable master data and are summarized in a statement of account that is mailed (or sent electronically) to customers. Required: Using the DFD in TB Figure 11.5 and the narrative description above, identify the words that belong in items 1 to 15 of Diagram 2.0 (TB Figure 11.6).



130. Below is the narrative for the "Receive payment" portion (i.e., bubble 3.0) of the B/AR/CR process. Narrative Description The payment and remittance advice data triggers the receive payment process. Upon receipt of the payment and RA from the bank, process 3.1 first validates the remittance by comparing the payment to the RA. Mismatches are rejected for later processing. If the payment and RA agree, the validated remittance is sent to process 3.2, which uses the RA to update the accounts receivable master data to reflect the customer's payment and records the collection in the cash receipts events data, and notifies the general ledger process of the amount of the cash deposited. This is an immediate update of the GL for a single cash receipt. Required: From the DFD in TB Figure 11.7 and the narrative description above, explode bubble 3.0 into a lower-level diagram showing the details of that process.



131. TB Figure 11.9 is the control matrix for the billing process presented in Chapter 11, but with certain items omitted. In the matrix, each omission is indicated by a box. Jumbled lists of the omitted items are as follows:

Omitted from Control Goals Columns 1. Accounts receivable master data 2. Ensure efficient employment of resources (people, computers) 3. For completed shipping notice inputs, ensure 4. Ensure security of resources 5. For the accounts receivable and master data, ensure 6. Ensure effectiveness of operations

Omitted Control Plans 7. 8. 9. 10. 11. 12.

Confirm customer accounts regularly Compare input shipping notices to sales order master data Independent pricing data Review shipped not billed sales orders (tickler file) Independent billing authorization Check for authorized prices, terms, freight, and discounts


Required: Complete TB Figure 11.9 by placing one of the numbers, 1 through 12, from the above lists into each box showing a missing item. HINT: Complete the control goal column headings first, and then use the cell entries as a guide in deciding which number (7 through 12 above) belongs in each box in the recommended control plans column.


132. TB Figure 11.11 is a systems flowchart for the billing process with letters indicating omitted descriptions. Fill in the omitted descriptions in the flowchart by matching the numbers from the list below with the letters on the flowchart.

Missing descriptio ns: 1. "Billing completed," changes to AR and related accounts 2. "Shipments not yet billed" 3. BT 4. Compare batch totals with changes to AR and related accounts 5. Create and print invoice, update AR, sales event, and GL data, send "Billing completed" notice with amounts posted to AR and related accounts 6. Customer 7. End 8. Select shipments to be billed and prepare batch total 9. Enterprise database 10. Error routine not shown 11. Invoice 12. Prepare and display "Shipments not yet billed" 13. Request shipments to be billed 14. Select shipments and execute billing program 15. Start



133. The E-R diagram below represents a B/AR/CR process but with the names of certain entities, and relationship cardinalities removed from the diagram. In alphabetic order, the names omitted are: · · · · · · · ·

BANKS CASH_RECEIPTS CUSTOMERS DEPOSITS INVENTORY SALES_INVOICES SALES_ORDERS SHIPMENTS

Required: Complete The E-R Diagram (TB Figure 11.12) by: a. Inserting the names from the above lists into the boxes where they belong. b. Inserting a 1 or an M or an N where necessary to indicate whether the cardinality of the relationship is: one-to-one (1:1), one-to-many (1:M), or many-to-many (M:N).



134. The following is a list of 10 control plans: A. B. C. D. E.

Independent billing authorization Review shipped not billed sales orders (tickler file) One-for-one checking of deposit slip and checks Compare input shipping notice to sales order master data Monitor open accounts receivable

F. G. H. I. J.

Immediately endorse incoming checks Document design Prenumbered documents Turnaround documents Immediately separate checks and remittance advices

Required: Listed below are ten statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). On the answer line to the left of each description, insert the capital letter from the list above of the best control plan to achieve the desired goal or to address the system deficiency described. A letter should be used only once. Answers

CONTR OL GOALS OR SYSTEM DEFICIE NCIES 1.

Helps to ensure that all shipments are billed in a timely manner.

2.

This feature can be used to help prevent duplicate document numbers from entering the system to ensure input validity.

3.

Helps to ensure the validity of shipping notices.

4.

Ensures efficient employment of resources and remittance advice input accuracy.

5.

Helps optimize cash flows, solve billing and cash receipts processing problems, and ensure that the organization complies with compensating balance requirements of loan agreements with its bank.

6.

Helps to ensure the security of resources (prevent fraudulent appropriation)

7.

Helps ensure remittance advice input validity, completeness and accuracy.

8.

Ensures that the items and quantities shipped are the same as the items and quantities on the sales order.

9.

Should have precluded a field salesman from omitting the sales terms from the sales order, thereby causing the order to be rejected by the computer data entry personnel.

10.

Reduces opportunities for lapping.


135. The following narrative describes a cash receipts process. The annotated systems flowchart for this cash receipts process is TB Figure 11.14 and the related control matrix is Figure TB 11.15. Narrative Description TB Figure 11.14 presents a physical description of the cash receipts process in which customer payments are received by mail. The source documents include checks and RAs. Each day, the process begins with mailroom clerks opening the mail. Immediately, the clerks endorse all checks. They assemble RAs (stubs from the customer invoice¾i.e., turnaround documents) in batches and prepare batch totals. The cash receipts data¾batch total and remittance details¾are then entered into the computer system via a scanner with OCR. The computer edits the data as the data are entered and computes batch totals. The batched RAs are sent to the accounts receivable department for filing, and the checks are transferred to the cashier. The editing process verifies the correctness of the entered data, including customer number and so forth. By matching the input cash receipts data to the open invoice data that reside on the accounts receivable master data in the enterprise database, the process also verifies that the customer account number, invoice number, and amount due are correct and that any cash discounts taken by the customer are legitimate (i.e., they have been authorized). After the data have passed all the control checks, the cash receipts event data, accounts receivable master data, and general ledger data are updated in the enterprise database. Also, the computer generates various cash reports and prepares the deposit slip. The deposit slip is transferred to the cashier. The cashier compares the checks and the deposit slip; if they agree, all documents are sent to the bank. Required: Using the format shown for control plan P-3, write descriptions for control plans P-1, P-2, P-5, M-1 and M-3.



P-3: Enter cash receipts close to where cash is received. · Efficient employment of resources: The direct entry of cash receipts data by mailroom personnel provides for a more efficient employment of resources because this arrangement eliminates the costs associated with the handling of the cash receipts data by additional entities. · Remittance advice input accuracy: Because mailroom personnel would have both the check and the RA, they would be in a position to correct many input errors "on the spot," thereby improving input accuracy.


Chapter 11--The Billing/Accounts Receivable/Cash Receipts (B/AR/CR) Process Key

1. TRUE 2. FALSE 3. TRUE 4. TRUE 5. TRUE 6. TRUE 7. TRUE 8. FALSE 9. FALSE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. FALSE 15. FALSE 16. TRUE 17. TRUE 18. FALSE 19. FALSE 20. TRUE 21. TRUE 22. FALSE 23. FALSE 24. TRUE 25. FALSE 26. FALSE 27. FALSE 28. TRUE


29. FALSE 30. TRUE 31. FALSE 32. TRUE 33. TRUE 34. TRUE 35. TRUE 36. TRUE 37. C 38. B 39. A 40. D 41. C 42. B 43. B 44. B 45. D 46. A 47. B 48. B 49. C 50. D 51. A 52. C 53. B 54. D 55. A 56. B 57. D 58. A 59. C 60. B 61. B 62. A


63. B 64. D 65. D 66. D 67. C 68. D 69. C 70. A 71. B 72. D 73. B 74. B 75. C 76. B 77. A 78. D 79. A 80. C 81. C 82. A 83. D 84. A 85. C 86. C 87. D 88. C 89. billing customers 90. controller 91. treasurer, controller or controller, treasurer 92. open accounts receivable or open accounts receivable (AR) or open AR 93. biller direct 94. Float 95. good 96. lockbox


97. Electronic bill presentment and payment (EBPP) or Electronic bill presentment and payment or EBPP 98. invoice 99. remittance advice or remittance advice (RA) or RA 100. accounts receivable master or accounts receivable (AR) master or AR master 101. sales event 102. bank account 103. open-item 104. balance-forward 105. open-item 106. post-billing 107. pre-billing 108. automated clearing house 109. electronic funds transfer 110. debit 111. B/AR/CR or billing/accounts receivable/cash receipts or billing/accounts receivable/cash receipts (B/AR/CR) 112. Check 21 113. open-item 114. debit card 115. Lapping 116. accounts receivable adjustments or accounts receivable (AR) adjustments or AR adjustments 117. automated clearing house (ACH) or automated clearing house or ACH 118. cash receipts event 119. turnaround 120. balance-forward 121. independent billing authorization 122. check for authorized prices, terms, freight, and discounts 123. independent pricing data 124. confirm customer accounts regularly 125. immediately endorse incoming checks 126. immediately separating checks and remittance advices


127.

128. 129. NOTE TO INSTRUCTORS: This question repeats the "Manage customer accounts" narrative of Problem 2 (in the original banks) but instead of asking students to draw Diagram 2.0 it asks them to identify missing diagram elements. 1. 2. 3. 4. 5. 6. 7. 8.

Sales return notification 2.1 Validate return Validated sales return notification 2.3 Prepare journal voucher GL sales return update Reject 2.2 Prepare credit memo Credit memo

9. 10. 11. 12. 13. 14. 15.

AR adjustments event data Periodic customer statements 2.5 Prepare customer statements Accounts receivable master data 2.4 Prepare bad debts journal voucher GL estimated bad debts update GL write-off update


130.

131.


132. Letter from flowchart A B C D E F G H I J K L M N O

Missing description 15 13 12 2 8 3 14 9 5 1 4 11 6 7 10


133.


134. 1. 2. 3. 4. 5.

B H A I E

6. 7. 8. 9. 10.

F C D G J


135. P-1: Immedia tely endorse incoming checks. · Security of resources: The checks are restrictively endorsed to protect them from being fraudulently appropriated. P-2: Turnaro und documen ts. · Efficient employment of resources: The use of the stub from the customer invoice as a turnaround document reduces the data entry that must be completed. · Remittance advice input accuracy: Scanning the computer-readable turnaround document reduces the risk of data entry errors, thereby improving accuracy. P-5: Compare input data with master data. · Effectiveness goal A, Efficient employment of resources: Cash receipts data can be entered more quickly and at a lower cost if errors are detected and prevented from entering the system. · Remittance advice input validity: The matching process verifies that any cash discounts deducted by customers have been authorized. · Remittance advice input accuracy: Comparison to the accounts receivable master data should reduce input errors. M-1: Immedia tely separate checks and remittan ce advices. · Effectiveness goals A, B, and C: The checks should be separated from the RAs and the checks deposited as quickly as possible. This helps to optimize cash flow and to ensure that the organization complies with compensating balance requirements of loan agreements with its bank. If the RAs were immediately separated from the checks, the process of recording the RAs also could be accelerated in that the customer payment could be recorded at the same time that the deposit is being prepared. Faster recording of the RAs (i.e., updating customer balances more quickly) helps minimize overdue accounts and reduces the investment in accounts receivable. Furthermore, because the information available from the system is more up to date, this plan also addresses the providing of more meaningful query and reporting functions. · Security of resources: The faster the checks are deposited, the less chance that the cash can be diverted. Also, by separating the check and RA, we can reduce opportunities for lapping. M-3: Monitor open accounts receivabl e.


Note: Most organizat ions regularly review aging reports, but that process is beyond the scope of that depicted in Figure TB 11.14, so we have marked this as missing. · Effectiveness goals A, B, and C: By following up on open accounts receivable, we can optimize cash flows, solve billing and cash receipts processing problems, and ensure that the organization complies with compensating balance requirements of loan agreements with its bank. · Remittance advice input validity, input completeness, and input accuracy: By following up on open accounts receivable, we can detect and correct any errors that may have previously been made in the billing and cash receipts processes.


Chapter 12--The Purchasing Process Student: 1. As used in the purchasing process chapter, the term "goods and services" refers to raw materials, merchandise, supplies, fixed assets, or intangible assets only. True False

2. The purchasing manager usually performs major buying activities as well as the required administrative duties of running a department. True False

3. The purchasing supervisor is responsible for receiving incoming goods, signing the bill of lading presented by the carrier, reporting the receipt of goods, and making prompt transfer of goods to the appropriate warehouse or department. True False

4. In many organizations professional buyers do the actual buying. True False

5. Goal congruence exists when each individual manager's goals are achieved. True False

6. The connections from the suppliers of merchandise and raw materials through to an organization's customers, including the flow of information, materials, and services, are its supply chain. True False

7. When the data on the inventory record indicate a need to replenish the stock, the inventory system prepares a purchase order. True False


8. The purchase requisition is sent from the inventory control department to the purchasing department. True False

9. Supply chain management (SCM) is the combination of processes and procedures used to ensure the delivery of goods and services to customers at the lowest cost while providing the highest value to the customers. True False

10. With continuous replenishment (CRP) a vendor obtains a buyer's current sales, demand, and inventory data in real time and replenishes the buyer's inventory. True False

11. Notifications that a PO has been prepared and sent to the vendor are sent to the receiving department, the accounts receivable process, and the department or process that requested the purchase. True False

12. Collaborative processes across the supply chain using a set of processes and technology models are called Collaborative Planning, Forecasting, and Replenishment (CPFR). True False

13. A retailer could misread a demand signal doubling its normal order, and the wholesaler could respond and also double its order resulting in four times the retail order. This is an example of the bullwhip effect. True False

14. According to the context diagram for the purchasing process, when a purchase order is sent to the purchaser, the vendor responds by sending the goods along with a packing slip. True False

15. Reorder point (ROP) analysis reorders inventory when the item reaches a certain inventory level that was determined in advance based on the item's purchase rate. True False


16. EOQ is a technique of analyzing all incremental costs associated with acquiring and carrying particular items of inventory. True False

17. ABC analysis is a technique for ranking inventory items according to their relative importance. True False

18. In selecting a vendor, a buyer may need to obtain competitive bids by means of a document called a purchase order. True False

19. A receiving report is an external request for the purchase of goods or services from a vendor. True False

20. After the vendor has been selected, the buyer prepares a purchase order. True False

21. Inventory personnel use the vendor master data to select an appropriate vendor. True False

22. It is not uncommon for the copy of the PO available for the receiving department to be a carbon copy, meaning that certain data is blanked out. True False

23. The business document that accompanies the purchased inventory from the vendor identifies the shipment and triggers the inventory receiving process is the vendor packing slip. True False

24. The document used to record merchandise receipts is called a purchasing report. True False


25. Whereas a receiving report normally indicates that goods have been received, some organizations use an acceptance report to acknowledge formally the satisfactory completion of a service contract. True False

26. The inventory master data contains a record of each vendor that is approved for use by the organization. True False

27. The purchase order master data is a compilation of open POs and includes the status of each item on order. True False

28. The warehouse master data contains a record of each inventory item which is stocked in the warehouse and/or regularly ordered from a vendor. True False

29. The purchase receipts data is an event data store with each record reflecting a receipt of goods and services. True False

30. A paperless system would eliminate documents and forms as the medium for conducting business transactions. True False

31. The warehouse number is the primary key for the relational table for inventory. True False

32. The item number is the primary key for relational table for vendors. True False

33. RFID tags are computer chips with an antenna that contains information about the object to which it is attached. True False


34. An employee has a conflict of interest when he (she) has a financial interest (direct or indirect) in a company with which the employer does business. True False

35. Digital signatures allow the vendor to determine that the sender of the message has the authority to send it and thus prevents an unauthorized purchase. True False

36. E-procurement is the use of information technology to automate significant portions of the procurement process. True False

37. The purchasing process is part of the A. order-to-cash B. purchase-to-pay C. conversion D. general ledger/financial reporting

process for a merchandising firm.

38. The typical purchasing process would capture and record data related to the day-to-day operations of all of the following except: A. shipping B. buyers C. receiving D. purchasing

39. As used in the text, the term services specifically refers to: A. items having a physical existence and value B. work performed by employees C. work performed by outside vendors D. products normally held for resale

40. Which of the following is least likely to report directly to the vice president of logistics? A. controller B. receiving department C. purchasing department D. warehouse


41. Which of the following managers is most likely to report to the controller? A. accounts payable department manager B. cashier C. purchasing department manager D. receiving department manager

42. The typical information flows in a purchasing process might include all of the following except: A. a purchase requisition is sent from inventory control to the purchasing department B. the purchase order is sent to the vendor C. goods or services are received from the vendor D. a copy of a receiving report is sent to the cashier

43. The purchasing manager is evaluated by his/her supervisors based on purchasing inventory at the lowest price. Consequently, the purchasing manager knowingly orders materials only based on price. This has resulted in the purchase of inferior quality materials. This improved the purchasing manager's performance evaluation, but had a negative impact on production due to an increase in scrapped materials. This situation is an example of a failure of: A. goal congruence B. management perquisites C. management by exception D. control theory

44. Assume that one of the process bubbles in the Purchasing Process - Level 0 Diagram is called "order goods and services." The data flow between "order goods and services" and the "vendor" is called a: A. purchase order B. receiving report C. stock notice D. inventory notice

45. Which of the following process bubbles would you not expect to see in the Purchasing Process - Level 0 Diagram? A. make payment B. order goods and services C. receive goods and services D. determine requirements


46. Which of the following data stores would you least expect to see in the Purchasing Process - Level 0 Diagram? A. inventory master data B. vendor master data C. purchase order master data D. cash receipts event data

47. In a purchasing process, once requirements are determined and a vendor selected, the next step is: A. the purchase requisition B. the purchase order C. receive goods and services D. a vendor acknowledgement

48. The purchasing process¾receive goods and services¾normally would be triggered by the data flow: A. purchase order B. vendor acknowledgement C. vendor packing slip D. purchase requisition

49. At the time that a purchasing orders goods and services, the process is likely to interact with all of the following data stores except the: A. purchase receipts data B. vendor master data C. inventory master data D. purchase order master data

50. At the time that a purchasing process places an order for goods or services, which of the following is typically updated? A. accounts payable master data B. purchase receipts data C. purchase order master data D. general ledger master data

51. In the Purchasing Process - Level 0 Diagram, a data flow called "vendor packing slip" would most likely be sent by the vendor to which of the following processes? A. order goods and services B. receive goods and services C. determine requirements D. none of the above


52. In the Purchasing Process - Level 0 Diagram, a data flow called "inventory's purchase requisition" most likely would be sent by the inventory management process to which of the following processes? A. order goods and services B. receive goods and services C. determine requirements D. none of the above

53. Outputs of a purchasing process normally might include all of the following except: A. purchase order B. PO inventory notification sent to the inventory system C. receiving report D. vendor invoice

54. Who usually authorizes a purchase requisition? A. the supervisor of the requisitioning department B. the purchasing manager C. a purchasing agent D. a customer

55. Which of the following techniques has the reorder point based on each inventory item's sales rate? A. cyclical reordering B. reorder point (ROP) analysis C. ABC analysis D. EOQ models

56. Which of the following is a technique for ranking items in a group based on the value, activity, sales, or other relevant metric for the items? A. cyclical reordering B. reorder point analysis C. EOQ models D. ABC analysis

57. Which of the following techniques analyzes all incremental costs associated with acquiring and carrying particular items of inventory? A. cyclical reordering B. reorder point analysis C. EOQ models D. ABC analysis


58. Inventory carrying costs include all of the following except: A. clerical cost of ordering goods B. opportunity cost of investment funds C. insurance costs D. obsolescence and deterioration

59. Which of the following is not a cost element as part of the inventory carrying costs? A. insurance costs B. property taxes C. purchase order preparation costs D. storage costs

60. When large or expensive items are purchased, most organizations make use of a procedure to obtain competitive bids from multiple vendors. The document used to obtain competitive bids is called a(n): A. purchase requisition B. purchase order C. request for quotation D. authorization to bid

61. The document one business sends to another business that identifies the goods or services to be purchased is a: A. request for proposal B. purchase requisition C. purchase order D. disbursement voucher

62. In a purchasing process, receiving goods, but not a vendor invoice, from a supplier typically results in an update to all of the following data stores except the: A. inventory master data B. vendor master data C. accounts payable master data D. purchase order master data

63. Purchase orders are sent to: A. customers B. vendors C. carriers D. managers


64. Which of the following most likely would be "blinded" on a copy of the purchase order sent to the receiving department? A. inventory descriptions B. vendor identification C. quantities D. freight terms

65. A control that can ensure that receiving clerks are not influenced by quantity information while actually counting incoming goods is to: A. send a "blind" copy of the purchase order to receiving B. establish a "tickler" file for completed purchase orders C. send copies of a receiving report to accounts payable D. establishing "blanket orders" in purchasing

66. A "blind" copy of the purchase order should be sent to receiving so that: A. receiving can anticipate the receipt of the goods from the vendor B. receiving clerks will know the value of what is on order C. partial shipments can be monitored D. receiving clerks will be forced to actually count the goods that are received

67. The vendor packing slip triggers which process? A. receive goods and services B. order goods and services C. determine requirements D. none of the above

68. In the process of preparing a receiving report, the receiving department should perform all of the following tasks except: A. inspect and approve quality B. count the quantity received C. compare the completed receiving report to the information stored in the purchase order master data D. compare the vendor's packing slip to a copy of the purchase requisition

69. In a purchasing process, the receiving report may be accessed by all of the following except: A. accounts payable department B. cashier C. warehouse D. requesting department


70. A receiving report is to goods what a(n) A. purchase requisition B. purchase order C. acceptance report D. vendor packing slip

is to services.

71. Data about vendor compliance with the terms of the purchase order normally would be included in the: A. accounts payable master data B. vendor master data C. inventory master data D. warehouse master data

72. The is a compilation of open purchase orders and includes the status of each item on order. A. accounts payable master data B. vendor master data C. vouchers payable master data D. purchase order master data

73. In an entity-relationship (E-R) diagram for the purchasing process, you would expect that the word generate would appear in the diamond showing the relationship between: A. VENDOR and PURCHASE_ORDERS B. VENDOR and EMPLOYEES C. VENDOR and PURCHASE_REQUISITIONS D. PURCHASE_REQUISITIONS and PURCHASE_ORDERS

74. In an entity-relationship (E-R) diagram for the purchasing process, you would expect that the word yield would appear in the diamond showing the relationship between: A. PURCHASE_REQUISITIONS and INVENTORY_RECEIPT B. PURCHASE_ORDERS and PURCHASE_RECEIPTS C. VENDOR and PURCHASE_ORDERS D. VENDOR and PURCHASE_REQUISITIONS

75. In a database containing (among others) six relations¾VENDORS, PURCHASE_REQUISITIONS, PURCHASE_ORDERS, PURCHASE_RECEIPTS, INVENTORY, and EMPLOYEES¾you would expect that the attribute Vend_No (vendor number) would be the primary key in the relation. A. VENDORS B. PURCHASE_ORDERS C. PURCHASE_RECEIPTS D. EMPLOYEES


76. Issues related to the purchasing function, such as kickbacks, bribes, conflicts of interest, and the like are often addressed by . A. job descriptions B. corporate codes of conduct C. computer security modules D. vendor master files

77. Which of the following items is not a control plan of the purchasing process? A. minimize inventory carrying costs B. approved purchase order C. compare vendors for favorable prices, terms, quality, and product availability D. PO confirmation to requesting department

78. The resources for which the purchasing process wants to ensure security for which of the following: A. purchase order master data B. inventory C. both a and b D. neither a or b

79. The control plan compare vendors for favorable prices, terms, quality, and product availability is directed primarily at which of the following control goals? A. ensure effectiveness of operations B. input validity C. input accuracy D. input completeness

80. Supply chain management: A. helps to ensure delivery of goods and services to customers of the highest value but increases costs. B. helps to ensure delivery of goods and services to customers at the lowest costs while providing the highest value. C. helps to ensure delivery of goods and services to customers at the lowest cost but can comprise quality. D. increases inventory across the supply chain.

81. Which of the following is not included in the SCOR model as one of the five basic components of supply chain management? A. Plan B. Source C. Deliver D. Receive


82. Which of the following is not a potential benefit of supply chain management? A. lower costs to the customer B. reduced inventories C. reduced customer orders D. reduced product defects

83. Which of the following is a potential problem with supply chain management initiatives? A. confused lines of responsibility B. inaccurate data within the supply chain C. over-reliance on demand forecasting D. all of the above

84. Which type of supply chain collaboration methods includes the vendor obtaining the buyer's current sales, demand, and inventory data in real time and replenishing the buyer's inventory? A. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) B. Collaborative Forecasting and Replenishment (CFAR) C. Collaborative Planning, Forecasting and Replenishment (CPFR) D. None of the above

85. Which type of supply chain collaboration methods includes the vendor replenishing standard merchandise while the buyer manages the replenishment of promotion merchandise? A. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) B. Co-Managed Inventory C. Collaborative Forecasting and Replenishment (CFAR) D. Collaborative Planning, Forecasting and Replenishment (CPFR)

86. Which type of supply chain collaboration methods includes the retailer and manufacturer forecasting demand and scheduling production jointly? A. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) B. Co-Managed Inventory C. Collaborative Forecasting and Replenishment (CFAR) D. Collaborative Planning, Forecasting and Replenishment (CPFR)

87. Which type of supply chain collaboration methods includes collaborative processes across the supply chain using a set of processes and technology models? A. Continuous Replenishment (CRP) or Vendor Managed Inventory (VMI) B. Co-Managed Inventory C. Collaborative Forecasting and Replenishment (CFAR) D. Collaborative Planning, Forecasting and Replenishment (CPFR)


88. As used in the purchasing process chapter, the term materials, merchandise, supplies, fixed assets, or intangible assets.

refers to raw

89. The manager usually performs major buying activities as well as the required administrative duties of running a department.

90. The supervisor is responsible for receiving incoming goods, signing the bill of lading presented by the carrier, reporting the receipt of goods, and making prompt transfer of goods to the appropriate warehouse or department.

91. In many organizations

92. Goal overall organizational objectives.

do the actual buying.

exists when individual managers' goals are in agreement with

93. The connections from the suppliers of merchandise and raw materials through to an organization's customers, including the flow of information, materials, and services, are its .

94. When data on the inventory record indicate a need to replenish the stock, the inventory system prepares a(n) .

95. The purchase requisition is sent from the inventory control department to the department.


96. Notification that a PO has been prepared and sent to the vendor is sent to the original requester, to , and to .

97. management is the combination of processes and procedures used to ensure the delivery of goods and services to customers at the lowest cost while providing the highest value to the customer.

98. With a vendor obtains a buyer's current sales, demand, and inventory data in real time and replenishes the buyer's inventory.

99. processes and technology models.

features collaborative processes across the supply chain using a set of

100. A retailer could misread a demand signal doubling its normal order and the wholesaler could respond and also double its order resulting in four times the retail order. This is an example of the effect.

101. According to the context diagram for the purchasing process, when a purchase order is sent to the vendor, the vendor responds by sending the goods along with a(n) .

102. reorders inventory when the item reaches a certain inventory level that was determined in advance based on the item's sales rate.

103. is a technique of analyzing all incremental costs associated with acquiring and carrying particular items of inventory.


104. is a technique for ranking inventory items in a group based on the value, activity, sales, or other relevant metric for the items..

105. In selecting a vendor, a buyer may need to obtain competitive bids by means of a document called a(n) .

106. A(n) from a vendor.

107. After the prepares a purchase order.

is an external request for the purchase of goods or services

has been selected, the

108. Documents requiring approval, such as a purchase requisition, may be routed for electronic approval using software.

109. Purchasing personnel use the have been approved for use by the organization.

data to identify potential suppliers that

110. A(n) copy of a document is one in which selected data are blanked out so that persons receiving that copy will not have access to the data.

111. The business document that accompanies the purchased inventory from the vendor and identifies the shipment and triggers the inventory receiving process is the .


112. The document used to record merchandise receipts is called a(n)

.

113. Whereas a receiving report normally indicates that goods have been received, some organizations use a(n) to acknowledge formally the satisfactory completion of a service contract.

114. The of each item on order.

is a compilation of open purchase orders that includes the status

115. The goods and services.

are an event data store with each record reflecting a receipt of

116. A(n) for conducting business.

system would eliminate documents and forms as the medium

117. The

is the primary key for the relational table for inventory.

118. The

is the primary key for relational table for vendors.

119. tags identify an instance of an item, not just an item type (e.g., this box of Huggies, not any box of Huggies).

120. An employee has a(n) when he (she) has a financial interest (direct or indirect) in a company with which the employer does business.


121. allow the vendor to determine that the sender of the message has the authority to send it and thus prevents an unauthorized purchase.

122. The process is an interacting structure of people, equipment, activities, and controls that is designed to accomplish the steps of requirements determination, purchase order processing, and goods receipt.

123. Purchase requisitions are compiled in a(n)

124. supply in the procurement process.

are particular Web sites or portals that may be used as sources of

125. Management should exercise the control plan purchase is within an applicable budget and that the purchase is desirable.

126. In preparing a PO, buyers should made from a suitable vendor.

data store.

to ensure that a

to ensure that a purchase is being

127. The control plan assumes that there is a segregation of duties between the personnel who create vendor records and those that create and approve POs, record accounts payable, and approve payments.

128. Before executing a purchase, buyers should compare vendors for favorable prices, , quality and to determine that they have made an optimal choice for the purchase.


129. Management should exercise the control plan of to ensure that an appropriate supplier has been selected and that the correct goods and services, for the correct amounts, are being purchased.

130. To prevent duplicate purchase requests and to allow the requesting department to ensure that a purchase order has been created, the purchasing department should .

131. means that before a receipt can be accepted and recorded, the receipt data should be compared with the PO master data to determine that an approved PO, prepared by someone other than receiving personnel, is on file.

132. The receiving department or quality control function should ensure that the correct goods are received in acceptable condition.

133. of the procurement process.

to

is the use of information technology to automate significant portions


134. Below is a narrative of the "Determine Requirements" portion (bubble 1.0) of the purchasing process described in Chapter 12. Narrative Description Bubble 1.1 receives and stores the requests received from the inventory-management process (inventory's purchase requisition) and various departments (purchase requisition¾goods and services). At predetermined intervals, bubble 1.2 accesses the accumulated requests held in the purchase requisition data; sorts the requests, perhaps by vendor or product type; and combines that data with the inventory master data to determine what purchases need to be made. Required: From the DFD (TB Figure 12.1) and the narrative description above, explode bubble 1.0 into a lower-level diagram showing the details of that process.



135. Below is a narrative of the "Order goods and services" portion (bubble 2.0) of the purchasing process described in Chapter 12. Narrative Description The first process involves vendor selection (bubble 2.1). A buyer generally consults the vendor master data to identify potential suppliers that have been approved for use by the organization and then evaluates each prospective vendor for a particular purchase. After the vendor has been selected, the buyer prepares a purchase order (PO). Process bubble 2.2 of depicts the process of preparing a PO. The "purchase order" data flowing out of process 2.2 is sent to the vendor. At the same time, the inventory master data is updated to reflect the goods on order. A record of the purchase is stored on the PO master data, and PO information is distributed to several departments, including the requesting department, the inventory management process, accounts payable process, and receiving. Required: From the DFD (TB Figure 12.3) and the narrative description above, explode bubble 2.0 into a lower-level diagram showing the details of that process.



136. Below is a narrative describing the "Receive goods and services" portion (bubble 3.0) of the purchasing process described in Chapter 12. Narrative Description The vendor packing slip, which accompanies the purchased inventory from the vendor and identifies the shipment, triggers the receiving process. As indicated by bubble 3.1 of the figure, goods arriving at the receiving department are inspected and counted, and these data are matched against the vendor packing slip and the "PO receiving notification" (i.e., the blind copy of the PO). Nonconforming goods are denoted by the reject stub out of process 3.1. Notation of rejected goods is added to the vendor service record in the vendor master data. After the count and condition of the goods has been obtained, process 3.1 completes the receiving report by noting the quantity received. Once annotated with the quantity received, the PO receiving notification becomes a receiving report, which is the document used to record merchandise receipts. Process 3.2 compares the receiving report data to the information stored in the PO master data¾a process that often is automatically completed by the information system. Bubble 3.2 also reflects the following activities: · · · · · · ·

Data about vendor compliance with the order terms are added to the vendor service record on the vendor master data. The receiving report data is stored as a copy of the receiving report document or electronically. Receiving report data is sent to the accounts payable process. A copy of the receiving report is sent to the warehouse (i.e., "Stock notice") with the goods. The inventory master data are updated to reflect the additional inventory on hand. The cost of the inventory received is relayed to the general ledger process (see the data flow "GL inventory received update"). Finally, the PO master data are updated to reflect the receipt of the goods.


Required: From the DFD (TB Figure 12.5) and the narrative description above, explode bubble 3.0 into a lower-level diagram showing the details of that process.


137. Below is a narrative describing the "Receive goods and services" portion (bubble 3.0) of the purchasing process described in Chapter 12. Narrative Description The vendor packing slip, which accompanies the purchased inventory from the vendor and identifies the shipment, triggers the receiving process. As indicated by bubble 3.1 of the figure, goods arriving at the receiving department are inspected and counted, and these data are matched against the vendor packing slip and the "PO receiving notification" (i.e., the blind copy of the PO). Nonconforming goods are denoted by the reject stub out of process 3.1. Notation of rejected goods is added to the vendor service record in the vendor master data. After the count and condition of the goods has been obtained, process 3.1 completes the receiving report by noting the quantity received. Once annotated with the quantity received, the PO receiving notification becomes a receiving report, which is the document used to record merchandise receipts. Process 3.2 compares the receiving report data to the information stored in the PO master data¾a process that often is automatically completed by the information system. Bubble 3.2 also reflects the following activities: · · · · · · ·

Data about vendor compliance with the order terms are added to the vendor service record on the vendor master data. The receiving report data is stored as a copy of the receiving report document or electronically. Receiving report data is sent to the accounts payable process. A copy of the receiving report is sent to the warehouse (i.e., "Stock notice") with the goods. The inventory master data are updated to reflect the additional inventory on hand. The cost of the inventory received is relayed to the general ledger process (see the data flow "GL inventory received update"). Finally, the PO master data are updated to reflect the receipt of the goods.


Required: Using the DFD in TB Figure 12.7 and the narrative description above, identify the words that belong in items 1 to 15 of Diagram 3.0 (TB Figure 12.8).


138. TB Figure 12.9 is the control matrix for the purchasing process presented in Chapter 12 with certain items omitted. In the matrix, each omission is indicated by a square. Jumbled lists of the omitted items are as follows:

Omitted from Control Goals Columns 1. Inventory and vendor and purchase order master data 2. Ensure security of resources 3. Vendor packing slip inputs 4. Purchase order and inventory master data 5. Purchase order inputs (i.e., requisitions) 6. Ensure effectiveness of operations 7. Ensure efficient employment of resources (i.e., people, computers) 8. Inventory master data


Omitted Control Plans 9. 10. 11. 12. 13. 14. 15.

Approve purchase order Use authorized vendor data Compare vendors for favorable price, terms, quality and product availability Automated data entry Independent authorization to record receipt Approve purchase requisition Count goods and compare to vendor packing slip


Required: Complete TB Figure 12.9 by replacing one of the numbers, 1 through 15 from the above lists, for each square showing a missing item.


139. The following is a list of 12 control plans.

Control Plans A. B. C. D. E. F.

Populate input screens with master data Programmed edit checks Approve purchase requisitions Requisition audit data Use authorized vendor data Compare vendors for prices, terms, quality, and product availability

G. H. I. J. K. L.

Approve purchase orders Confirm purchase order to requesting department Digital signatures Enter receipt data in receiving department Independent authorization to record receipt Inspect goods

Required: Listed below are 10 system failures that indicate weaknesses in control. On the answer line to the left of each description, insert the capital letter (from the list above) of the best control plan to address the system deficiency described. A letter should be used only once. Two letters will not be used. Answers

SYSTEM FAILUR ES 1.

Ordered goods are often of a different quality and price than requested.

2.

Data on the RFID tags are not compared to the existing purchase order to ensure that we have received the goods that we ordered.

3.

Purchase orders are sometimes prepared on the basis of purchase requisitions from departments with no budget to pay for the ordered goods.

4.

The computer does not automatically identify erroneous or suspect data on purchase orders before they are printed for signing and mailing.

5.

Inventory is being discarded or sold at a reduced price due to damage or quality issues.

6.

Bill the buyer often prepares purchase orders for vendors owned by his relatives.

7.

Clerks in the purchasing department enter purchase order data from forms given to them by the buyers. They spend a considerable amount of time typing in the vendor name and address, and item descriptions and prices.

8.

The vendor has no way of knowing if the electronic purchase order was sent by authorized personnel of the buyer.

9.

The purchasing manager has not informed the requisitioning department in a timely manner to let them know that their requests were processed.

10.

Certain vendors have been favored in the selection process.


140. TB Figure 12.11 is a partial flowchart for the purchasing process. There are selected symbols that must be filled in to complete the flowchart. Fill in the items with missing labels using a letter from A to J.

A. B. C. D. E. F. G. H. I. J.

Enter approval (for PO) Enterprise database Enter requisition data Exception routine not shown Requisition approval screen Enter approval (for requisition) PO input screen Requisition screen with vendor candidates Edit input and record PO Edit input and record requisition


141. TB Figure 12.13 is the annotated systems flowchart for the purchasing process. TB Figure 12.14 is the related control matrix. Following the control matrix is a description of the first control plan, P-1. Required: Using the format shown for control plan P-1, write descriptions for control plans P-2 through P-6.

Control goals of the Purchasi ng Process Control Control goals of goals of the the operation informatio s process n process


Ensure Ensure Ensure effectiven efficient security of ess employ- resources of ment of (vendor and operation resources purchase s (people, order computers master ) data)

Recommended control plans Present controls P-1: Approve purchase requisition P-2: Use authorized vendor data P-3: Independent vendor master data maintenance P-4: Compare vendors for favorable price, terms, quality, and product availability P-5: Approve purchase order P-6: Confirm purchase order to requesting department Missing controls None noted

A

B

P-2 P-3

P-2 P-3

P-2

For For the the purchase pur order cha master se data, ord ensure: er inp uts (i.e., pur cha se req uisit ions ), ens ure: IV

IC

IA

UC

UA

P-1 P-2 P-3 P-3

P-4

P-5

P-5

P-5 P-6

Possible effectiveness goals include the IV = input following: validity A¾Select a vendor who will provide the best IC = input completen quality at the lowest price ess by the required delivery date. B¾Comply with corporate code of conduct IA = input accuracy UC = update completen ess UA = update accuracy TB Figure 12.14

P-1: Approve purchase requisiti on. · Purchase requisition input validity: By obtaining approvals for all purchase requisitions, we reduce the possibility that invalid (unauthorized) requisitions will be input.


Chapter 12--The Purchasing Process Key

1. FALSE 2. TRUE 3. FALSE 4. TRUE 5. FALSE 6. TRUE 7. FALSE 8. TRUE 9. TRUE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. FALSE 15. FALSE 16. TRUE 17. TRUE 18. FALSE 19. FALSE 20. TRUE 21. FALSE 22. FALSE 23. TRUE 24. FALSE 25. TRUE 26. FALSE 27. TRUE 28. FALSE 29. TRUE


30. TRUE 31. FALSE 32. FALSE 33. TRUE 34. TRUE 35. TRUE 36. TRUE 37. B 38. A 39. C 40. A 41. A 42. D 43. A 44. A 45. A 46. D 47. B 48. C 49. A 50. C 51. B 52. C 53. D 54. A 55. B 56. D 57. C 58. A 59. C 60. C 61. C 62. C 63. B


64. C 65. A 66. D 67. A 68. D 69. B 70. C 71. B 72. D 73. D 74. B 75. A 76. B 77. A 78. C 79. A 80. B 81. D 82. C 83. D 84. A 85. B 86. C 87. D 88. goods 89. purchasing 90. receiving 91. professional buyers 92. congruence 93. supply chain 94. purchase requisition 95. purchasing 96. receiving, accounts payable or accounts payable, receiving 97. Supply chain


98. continuous replenishment (CRP) or vendor managed inventory (VMI) or supplier managed inventory (SMI) or continuous replenishment or vendor managed inventory or supplier managed inventory or CRP or VMI or SMI 99. Collaborative Planning Forecasting and Replenishment (CPFR) or Collaborative Planning Forecasting and Replenishment or CPFR 100. bullwhip 101. vendor packing slip 102. Reorder point (ROP) analysis or ROP analysis or Reorder point analysis 103. Economic order quantity (EOQ) or EOQ or Economic order quantity 104. ABC analysis 105. request for quotation (RFQ) or RFQ or request for quotation 106. purchase order 107. vendor, buyer 108. workflow 109. vendor master 110. blind 111. vendor packing slip 112. receiving report 113. acceptance report 114. purchase order master data 115. purchase receipts data 116. paperless 117. item number or Item_No 118. vendor number or Vendor_No 119. Radio frequency identification (RFID) or Radio frequency identification or RFID 120. conflict of interest 121. Digital signatures 122. purchasing 123. purchase requisition 124. B2B marketplaces 125. approve purchase requisitions 126. use authorized vendor data 127. independent vendor master data maintenance 128. terms, product availability or product availability, terms 129. approve purchase orders 130. confirm purchase order to requesting departments 131. Independent authorization to record receipt


132. inspect goods 133. E-procurement

134.

135.


136.

137. NOTE TO INSTRUCTORS: This question repeats the "Receive goods and services" narrative of Problem 3 (in the original banks) but instead of asking students to draw Diagram 3.0 it asks them to identify the missing diagram pieces. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.

Vendor master data PO receiving notification Vendor packing slip Purchase order master data GL inventory received update Purchase receipts data 3.1 Inspect and count goods Receiving report 3.2 Compare receiving report and purchase order Receiving report Stock notice Reject Reject Vendor master data Inventory master data


138. 139. System Failure 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Answer F K C B L E A I H G


140.


141. P-2: Use authoriz ed vendor data. · Effectiveness goal A: Buyers in the purchasing department are presented with a list of vendor candidates that have been approved by management. The screening of vendors that preceded their being added to the authorized data should help ensure the selection of a vendor that will provide the best quality at the lowest price by the promised delivery date. · Effectiveness goal B: Screening of vendors helps to ensure that company employees do not have financial interests in a vendor that would jeopardize their ability to be impartial in selecting a vendor with whom to place an order. · Efficient employment of resources: People resources (buyers' time) are used efficiently because time is not wasted in searching for vendors that might not even supply the required goods or services. · Purchase requisition input validity: The blanket approval accorded to vendors who are placed on the authorized vendor data also helps ensure the validity of the POs issued. P-3: Independ ent vendor master data maintena nce. · Effectiveness goals A and B, security of resources: By having someone other than the buyers add vendors to the vendor master, data we can obtain independent support for the quality of their products and processes (goal A), ensure that there will be no conflict of interest for the buyer (goal C), and ensure the integrity of the vendor master data (security of resources). · Purchase requisition input validity: Valid purchase requisitions are those that result in POs to vendors that have received prior authorization. P-4: Compare vendors for favorabl e prices, terms, quality, and product availabil ity. · Effectiveness goal A: The comparison of vendors should help ensure the selection of a vendor who will provide the best quality at the lowest price by the promised delivery date. P-5: Approve purchase order. · Effectiveness goal A: After the PO is checked against the requisition details, it is approved by the purchasing manager and other authorized individuals¾by adding an approval code to the PO record. The manager's approval includes the vendor chosen by the buyer and the items and quantities purchased. · Effectiveness goal B: This control plan could flag situations in which certain vendors appear to be favored in the vendor-selection process. · Purchase requisition input validity: Approval by the purchasing manager helps to ensure validity of the PO. P-6: Confirm purchase order to requestin g departm ent. · Purchase requisition input completeness: After the PO has been released by the purchasing manager, a confirmation of the requisition is sent to the requesting department. Should the confirmation not be received in a timely manner, the requester will follow up to see that the request is processed.


Chapter 13--The Accounts Payable/Cash Disbursements (AP/CD) Process Student: 1. The cashier is responsible for processing vendor invoices, preparing payment vouchers, and recording purchase and disbursement transactions. True False

2. The notification of an obligation to pay a vendor for merchandise that was ordered and received is known as a purchase order. True False

3. A true voucher system requires that all expenditures for whatever purpose and in excess of a certain dollar amount be formally approved for payment before they can be paid. True False

4. The vendor invoice master data is a repository of all unpaid vendor invoices. True False

5. The AP/CD process is an interacting structure of people, equipment, activities, and controls that is designed to accomplish the handling of repetitive work routines of the AP department and the cashier, support their decision needs, and assist in the preparation of internal and external reports. True False

6. The cashier usually reports to the controller. True False

7. The VP of finance usually has the cashier and the controller directly reporting to him (her). True False


8. When it is time to make a payment, an approved voucher is sent to the accounts payable department. True False

9. The Level 0 diagram of the AP/CD Process contains the two process bubbles depicting the two major logical steps in the process: Establish payable and Approve checks. True False

10. When the vendor payment is made, the general ledger is updated for the cash disbursement. True False

11. The vendor invoice triggers the "establish payable" process. True False

12. The vendor sends a confirmation to establish the payable. True False

13. A disbursement voucher is designed to reflect formal approval of the voucher for payment and to provide such added data as the account distribution and the amounts to be debited. True False

14. The purchase order triggers the make payment process. True False

15. Within the make payment process, the three sub-processes are "Prepare proposed payments," "Select and record payments," and "Issue and record disbursements." True False

16. The trigger for either a true voucher process or a nonvoucher process is a payment request. True False


17. The cash disbursements event data shows, in alphabetical order, the details of each cash payment made. True False

18. In the ER diagram for AP/CD process, CASH_DISBURSEMENTS are prepared by EMPLOYEES (Treasury Employees). True False

19. In the ER diagram of the AP/CD process, VALID_INVOICES are received from the purchasing department. True False

20. In a relational table for PURCHASE_RECEIPTS, the primary key would be the receipt number (Rec_No). True False

21. In a relational table for VALID_INVOICES, the primary key would be the vendor number. True False

22. In the flowchart for the AP/DC process the symbol below represents the enterprise database.

True

False

23. Fraud abuses in the AP/CD process usually entail creating phony customers or submitting fictitious purchase orders. True False

24. Independent validation of vendor invoices helps ensure that appropriate cash discounts are obtained. True False


25. The duties of the cashier are segregated from the treasurer to protect the cash resource. True False

26. The cash disbursements process uses disbursement vouchers as inputs to update the accounts payable master data. True False

27. A key control in the AP/CD process is to segregate the treasurer and controller. True False

28. Chapter 13 describes the electronic invoicing and payment (EIPP) system for the B2C environment. True False

29. The electronic invoicing and payment (EIPP) system for the B2B environment is similar to the electronic bill presentment and payment (EBPP) system for the B2C environment. True False

30. Evaluated receipt settlement (ERS) is a process by which an organization pays for a purchase on the basis of the goods receipt. True False

31. Purchase returns and allowances usually occur at the point of inspecting and counting the goods or at the point of validating vendor invoices. True False

32. Spear phishing is a type of phishing attack that is sent to a wide variety of persons. The e-mail appears to be coming from an individual or organization that the recipient recognizes and from whom they normally receive e-mails. True False

33. Independent authorization to make payment ensures that only authorized purchases are made. True False


34. The "three-way match" matches the invoice with the purchase order and disbursement voucher. True False

35. It is difficult to independently validate the vendor invoice if we do not segregate purchasing, receiving, and accounts payable. True False

36. The typical AP/CD process would capture and record data related to the day-to-day operations of all of the following departments except: A. shipping B. cashier C. receiving D. activities for all of the above are captured and recorded by the AP/CD process.

37. Which of the following is least likely to report (either directly or indirectly) to the vice president of finance? A. controller B. treasurer C. shipping department supervisor D. accounts payable department

38. Which of the following managers is most likely to report to the controller? A. accounts payable department manager B. cashier C. purchasing department manager D. receiving department manager

39. The typical horizontal flows of information in an accounts payable/cash disbursements process might include all of the following except: A. an invoice is received from a vendor B. the paid voucher is sent to the accounts payable department C. an approved disbursement voucher is sent to the cashier D. a copy of a receiving report is sent to the cashier


40. Which of the following process bubbles would you not expect to see in the logical DFD for an AP/CD process? A. requisition inventory B. establish payable C. make payment D. all of these are process bubbles

41. In an AP/CD process "establish payable" would normally be triggered by: A. vendor invoice B. a purchase order C. a copy of the purchase order sent to the inventory process D. a vendor acknowledgement

42. In an AP/CD process, a process "make payment" normally would be triggered by the data flow: A. purchase order B. vendor acknowledgement C. vendor packing slip D. payment due date information

43. At the time that an AP/CD process makes payment for goods or services, the process generally follows which order." A. select and record payments, prepare proposed payments, issue and record disbursements B. prepare proposed payments, issue and record disbursements, select and record payments C. issue and record disbursements, select and record payments, prepare proposed payments D. prepare proposed payments, select and record payments, issue and record disbursements

44. When the AP/CD process records a payable obligation, the data flow between "validate invoice" and "record payable" is? A. GL payable update B. AP notification C. validated vendor invoice D. receiving report

45. In the Level 0 DFD for an AP/CD process, a data flow called "vendor invoice" most likely would be sent by the vendor to which of the following processes? A. establish payable B. make payment C. order inventory D. none of the above


46. In the Level 0 DFD for an AP/CD, a data flow called "receiving report" most likely would be sent by the purchasing process to which of the following processes? A. order inventory B. receive goods and services C. establish payable D. make payment

47. Data flows of an AP/CD process normally might include all of the following except: A. PO accounts payable notification B. sales report C. receiving report D. vendor invoice

48. Who usually authorizes a payment? A. the controller B. the purchasing manager C. a purchasing agent D. the treasurer

49. Which of the following is designed to reflect the formal approval of the voucher for payment? A. a vendor invoice B. an RFQ C. a payment voucher D. a disbursement voucher

50. An exception routine is usually performed for: A. processing payments B. vendor invoice identification C. purchase returns and allowances D. general ledger updates

51. Payments not typically supported by invoices include: A. payroll B. income taxes C. investments D. all of the above


52. The document one business sends to another business that identifies the amount to be paid is: A. check B. purchase requisition C. vendor invoice D. disbursement voucher

53. Which document typically notifies the purchaser of his or her obligation to pay? A. vendor packing slip B. receiving report C. acceptance report D. vendor invoice

54. Which of the following documents would be matched with the vendor invoice to ensure that the purchase was authorized (i.e., to ensure input validity)? A. receiving report B. acceptance report C. purchase order D. vendor packing slip

55. In a typical, efficient AP/CD process, you would expect that "validating" a vendor invoice might include all of the following steps except: A. having a copy of the invoice approved by the purchasing manager B. comparing the invoice with a copy of the purchase order C. comparing the invoice with a copy of the receiving report D. checking the invoice for mathematical accuracy

56. Which disbursement system most easily facilitates paying a number of invoices with a single check? A. nonvoucher system B. voucher system C. balance-forward system D. open-items system

57. Which of the following activities would not occur when an inventory manager decides to return merchandise to a vendor? A. the accounts payable department is notified B. a credit memorandum is issued to the vendor C. the warehouse is instructed to release the merchandise to the shipping department D. a debit memorandum is prepared


58. In a voucher system, the data flow between the originating department and the process "prepare disbursement voucher" typically is: A. the disbursement voucher B. the payment notification C. the payment request D. the check

59. Which of the following statements regarding evaluated receipt settlement (ERS) is false? A. ERS is a system by which an organization pays for a purchase on the basis of the goods receipt. B. ERS can reduce the costs associated with entering invoices, matching the invoice with the PO and receiving report, and resolving discrepancies between the invoice and the PO and goods receipt. C. ERS arrangements are only made with vendors who have proven e-payment records. D. Upon receipt of the goods, the AP/CD system compares the received quantity to the open purchase quantity and, if appropriate, makes a payment based on the price and terms on the PO.

60. Information for evaluating vendor performance normally would reside on the: A. accounts payable master data B. vendor master data C. vouchers payable master data D. purchase order master data

61. In an entity-relationship (E-R) diagram for the accounts payable/cash disbursements process, you would expect that the words sent to would appear in the diamond showing the relationship between: A. VENDORS and INVENTORY_RECEIPTS B. VENDORS and VENDOR_INVOICES C. VENDORS and CASH_DISBURSEMENTS D. CASH_DISBURSEMENTS and INVENTORY_RECEIPTS

62. A company using a centralized database approach to data management might not maintain a relational table for ACCOUNTS PAYABLE. Rather, accounts payable balances at any point in time could be computed as the difference between the relations for which of the following continuous events? A. PURCHASE_ORDERS and INVENTORY_RECEIPTS B. INVENTORY and INVENTORY_RECEIPTS C. VALID_ INVOICES and INVENTORY_RECEIPTS D. VALID_ INVOICES and CASH_DISBURSEMENTS


63. What factor has caused an escalation of check forgeries in recent years? A. the increased use of EDI B. the availability of cheap color printers C. a lack of control plans to control automated funds transfer D. a repeal of severe civil and criminal penalties for such crimes

64. Which of the following items is not a control plan of the AP/CD process? A. check for authorized prices, terms, freight, and discounts B. independent validation of vendor invoices C. independent authorization to make payment D. reconcile bank account

65. The resources for which the AP/CD process wants to ensure security typically include all of the following except: A. Cash B. accounts payable master data C. accounts receivable master data D. none of the above

66. The control plan tickler file of payments due, is directed primarily at which of the following control goals? A. select a vendor who will provide the best quality at the lowest price by the promised delivery date B. input validity C. input accuracy D. input completeness

67. A control plan that helps ensure the security of resources within the AP/CD process is: A. requisition confirmation to originating department B. approve vendor selection C. independent validation of vendor invoice D. independent authorization to make payment

68. A control plan to ensure input accuracy in payables processing is: A. requisition confirmation to originating department B. match invoice, purchase order, and receiving report C. tickler file of payments due D. independent authorization to make payment


69. The control plan independent validation of vendor invoice is directed primarily at which of the following control goals? A. select a vendor who will provide the best quality at the lowest price by the promised delivery date B. input validity C. input accuracy D. input completeness

70. The AP application matches invoices, quantities, prices and terms when it performs the control plan: A. independent validation of vendor invoices B. match invoice, purchase order, and receiving report C. independent authorization to make payment D. reconcile input and output batch totals

71. For payment voucher input validity, which control plan uses records in the AP master data to give authorization to the cash disbursements computer program to make a payment? A. independent validation of vendor invoices B. match invoice, purchase order, and receiving report C. independent authorization to make payment D. reconcile input and output batch totals

72. Which of the following statements regarding e-payment technologies is true? A. an advantage to the payer is that float is eliminated B. the use of EDI for payments continues to decline in use C. e-payments are settled through the ACH network, by wire transfer, or by debit or credit card D. the cost of paying an invoice is reduced by about 50% when using e-payments

73. Which control is most likely to address the goal of input completeness? A. agreement of run-to-run totals B. digital signature C. independent validation of vendor invoice D. tickler file of open purchase orders and receiving reports

74. The AP/CD process handles the repetitive work routines of: A. cashier B. purchasing C. Receiving D. all of the above


75. The debit entry in the general ledger at the time that the vendor invoice is recorded will be to a clearing account because of the: A. design of the business process B. software employed C. credit entry made when the goods were received D. all of the above

76. An enterprise system may facilitate the AP/CD process by linking: A. the PO and receiving report B. the PO and invoice C. the invoice and the related cash disbursements D. all of the above

77. Information technology has enhanced the AP/CD process by: A. eliminating invoices B. eliminating paper checks C. reducing the cost to process an invoice by up to 40% D. all of the above

78. The department is responsible for processing vendor invoices, preparing disbursement vouchers, and recording purchase and disbursement transactions.

79. The notification of an obligation to pay a vendor for merchandise that was ordered and received is known as a(n) .

80. In an AP/CD process, a frequent exception routine is caused by

.

81. To initiate an adjustment for returned goods or for a price allowance in the case of otherwise nonconforming goods, someone usually prepares a(n) and sends it to the vendor.


82. A true system requires that all expenditures be formally approved for payment and be recorded as a payable before they can be paid.

83. The

data is a repository of all unpaid vendor invoices.

84. The is an interacting structure of people, equipment, activities, and controls that is designed to accomplish the handling of repetitive work routines of the AP department and the cashier, support their decision needs, and assist in the preparation of internal and external reports.

85. The cashier usually reports to the

.

86. The VP of finance usually has the

and the directly reporting to him (her).

87. When it is time to make a payment, an approved

is sent to the cashier.

88. The Level 0 diagram of the AP/CD Process contains the two process bubbles of and .

89. The vendor sends a(n) for goods or services ordered by and shipped to the purchaser.

90. The

to notify the purchaser of an obligation to pay

triggers the "establish payable" process.


91. A(n) is designed to reflect formal approval of a payment and to provide such added data as the account distribution and the amounts to be debited.

92. The

triggers the "make payment" process.

93. Within the make payment process, the three sub-processes are "Prepare proposed payments", "Select and record payments," and .

94. When processing non-invoiced disbursements, the trigger for either a true voucher process or a non voucher process is a(n) .

95. The

master data store is a repository of all unpaid vendor invoices.

96. The payment made.

data shows, in chronological sequence, the details of each cash

97. In the ER diagram for AP/CD process, CASH_DISBURSEMENTS are by EMPLOYEES (Treasury Employees).

98. In the ER diagram of the AP/CD process, VALID_INVOICES are received from the .

99. In a relational table for PURCHASE_RECEIPTS, the primary key would be the .


100. In a relational table for VALID_INVOICES, the primary key would be the .

101. Fraud abuses in the AP/CD process usually entail creating phony submitting fictitious invoices.

or

102. The control plan includes an aging of open vouchers / accounts payable records that is produced and reviewed on a regular basis in order to ensure that there is an adequate cash reserve to make required payments.

103. Input validity for goods that were actually ordered and actually received.

is ensured by making sure that the invoice is for

104. The AP process that uses vendor invoices for inputs updates the master data.

105. is an exception that usually occurs at the point of inspecting and counting the goods or when validating vendor invoices.

106. basis of the receipt of the goods.

is a process by which an organization pays for a purchase on the

107. systems are B2B systems that combine e-invoicing and e-payment processes to send invoices to electronic invoices to customers and to receive electronic payments.


108. The control plan requires that the authority for recording a vendor invoice come from the purchase order and receiving report created by entities other than the entity that records the vendor invoice.

109. To ensure that a vendor invoice is recorded accurately and that items on the invoice were ordered and received requires that we .

110. To ensure that only authorized payments are made, there should be whereby the accounts payable records on which the payment is based should created by an entity other than the entity that executes the payment.

111. The control plan matches records of cash disbursements to bank records to ensure that all disbursements actually made by the bank were authorized and accurate.

112. The figure below shows a portion of the horizontal perspective of an accounts payable/cash disbursements (AP/CD) process. The following functional titles (for the AP/CD process organizational structures and the entities with which the AP/CD process interacts) and information flows, depicted as documents, generated or captured by the AP/CD process, have been omitted.

Functional titles (for the AP/CD structures and entities with which the process interacts) A. Accounts payable B. Cashier C. Controller D. Treasurer

E. F. G.

VP Finance Vendor General ledger


Informatio n flows (depicted as document s) H. Payment request notice sent from accounts payable to general ledger I. Payment request (voucher) sent from accounts payable to cashier J. Payment (check) sent to vendor by cashier K. Invoice sent to accounts payable from vendor L. Payment notice sent from cashier to general ledger M. Payment notice sent from cashier to accounts payable N. Accounts payable invoice notice sent from accounts payable to general ledger

Required: Complete TB Figure 13.1 by inserting the letter corresponding to the: (a) functional titles into the boxes (b) information flow descriptions in the document symbols


113. Below is a narrative of the "Establish payable" portion (bubble 1.0) of the AP/CD process described in Chapter 13. Narrative Description The first step in establishing the payable involves validating the vendor invoice. This process is triggered by receipt of the vendor invoice. Process 1.1 comprises a number of steps. First, the vendor invoice is matched against vendor master data to determine that the invoice is from an authorized vendor. Next, the vendor invoice is compared against the PO data (see the flow PO accounts payable notification) to make sure that there is a PO (i.e., there is an authorized purchase) and that the invoiced items, quantities, and prices conform to the PO. Then, the invoice is matched against the receiving report data to determine that the items and quantities have been received. Finally, the invoice is further validated by checking for accuracy of terms, computed discounts, extensions, and total amount due. Note that the vendor master data is updated at this point to reflect purchase history data. If the data items do not agree, the invoice is rejected, and follow-up procedures are initiated (see the reject stub emanating from bubble 1.1). If the data items agree, the invoice is approved, and the validated invoice is sent on to the next step to be used to record the payable. Bubble 1.2 depicts the process of recording the payable in the purchase events data and accounts payable master data. A payable is recognized and recorded by: · · · ·

Creating a record in the purchase events data store. Creating a record in the accounts payable master data to reflect an open invoice¾a payment due to a vendor. Updating the inventory master data for the cost of the items received. Notifying the general ledger of the amount of the payable that was recorded (see the data flow "GL payable update").


Required: From the DFD (TB Figure 13.3) and the narrative description above, explode bubble 1.0 into a lower-level diagram showing the details of that process.


114. Below is a narrative for the "Make payment" portion (bubble 2.0) of the accounts payable/cash disbursements process described in Chapter 13. Narrative Description The payment process begins with the periodic preparation of a list of payments that might be made at this time (bubble 2.1). The selection of items for this list is based on payment due dates and terms that may indicate a discount can be taken for a payment at this time. The proposed list is reviewed and amended (bubble 2.2) to add additional invoices that are not due for payment yet but that can be consolidated with other payments being made to a vendor. Proposed payments may be removed from the list if there are insufficient funds or if payments to a vendor are on hold. Bubble 2.3 depicts the process of preparing the disbursement, which is equal to the amount of the invoice less any discount taken. The payment is recorded by: · · ·

Marking the invoice as paid on the accounts payable master data. Making an entry in the cash disbursements event data store. Sending payment data to the general ledger where an entry is made to reflect the payment.


Required: From the DFD (TB Figure 13.5) and the narrative description above, explode bubble 2.0 into a lower-level diagram showing the details of that process.


115. Below is a narrative for the "Make payment" portion (bubble 2.0) of the accounts payable/cash disbursements process described in Chapter 13. Narrative Description The payment process begins with the periodic preparation of a list of payments that might be made at this time (bubble 2.1). The selection of items for this list is based on payment due dates and terms that may indicate a discount can be taken for a payment at this time. The proposed list is reviewed and amended (bubble 2.2) to add additional invoices that are not due for payment yet but that can be consolidated with other payments being made to a vendor. Proposed payments may be removed from the list if there are insufficient funds or if payments to a vendor are on hold. Bubble 2.3 depicts the process of preparing the disbursement, which is equal to the amount of the invoice less any discount taken. The payment is recorded by: · · ·

Marking the invoice as paid on the accounts payable master data. Making an entry in the cash disbursements event data store. Sending payment data to the general ledger where an entry is made to reflect the payment.


Required: Using the DFD in TB Figure 13.7 and the narrative description above, identify the words that belong in items 1 to 9 of Diagram 2.0 (TB Figure 13.8).


116. TB Figure 13.9 is the control matrix for the accounts payable/cash disbursements process presented in Chapter 13, but with certain items omitted. In the matrix, each omission is indicated by a box. Jumbled lists of the omitted items are as follows:

Omitted from Control Goals Columns 1. Cash, Accounts payable master data 2. Ensure security of resources 3. Payment inputs 4. Accounts payable master data

Omitted Control Plans 9. 10. 11. 12. 13. 14.

Tickler file of open purchase orders and receiving reports Independent authorization to make payment Tickler file of payments due Digital signatures Independent validation of vendor invoices Reconcile bank account

5. 6. 7. 8.

Vendor invoice inputs Ensure effectiveness of operations Ensure efficient employment of resources Accounts payable master data


Required: Complete the matrix in parts 1 and 2 of TB Figure 13.9 below by placing one of the numbers, 1 through 14 from the above lists, in each empty box.

117. The flowchart below is the accounts payable/cash disbursements process presented in Chapter 13, but with certain items omitted. In the flowchart, each omission is indicated by a capital letter (A through I). Jumbled lists of the omitted items are as follows:

1. 2. 3. 4. 5. 6. 7. 8. 9.

Compare incoming invoices to PO and receiving report data and record AP and GL data Display of proposed payments Enterprise database Exception routine not shown Payment totals Prepare payment order and RA, update AP and GL data for payment, display payment totals Select payments, calculate batch totals Translate from EDI and record incoming invoices VAN


Required: Complete the flowchart TB Figure 13.11 by placing one of the numbers, 1 through 9 from the above lists, to match the letters showing the missing items.

118. The following is a list of 10 control plans.

Control Plans A. B. C. D. E.

Independent validation of vendor invoices Tickler file of payments due Preformatted screens Tickler file of open POs and receiving reports Cash planning report

F. G. H. I. J.

Match invoices, POs, and receiving reports Reconcile input-output batch totals Digital signatures Independent authorization to make payment Reconcile bank account


Required: Listed below are ten system failures that indicate weaknesses in control. On the answer line to the left of each description, insert the capital letter (from the list above) of the best control plan to address the system deficiency described. A letter should be used only once. Answers

SYSTEM FAILUR ES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

There is often an inadequate amount of cash on hand to make required payments. Some discounts are lost and vendor relations are negatively impacted. Some vendor invoices are not received and input in a timely manner. Some discounts are lost. Data fields must be manually entered and users can customize the input fields as needed. The data entry process is, therefore, slow and error prone. Payables are not tracked by due date and discounts are often missed. The VAN does not know that the sender of a message has the authority to send it. Overpayments are made to the vendor because invoices are for quantities and prices other than what was ordered and received. Invoices are recorded for items that were never ordered. Invoices are paid even though there is no invoice on the accounts payable master data. The totals calculated for payments before the input do not match those produced after the updates have been made. Unauthorized and incorrect disbursements have been recorded.


Chapter 13--The Accounts Payable/Cash Disbursements (AP/CD) Process Key

1. FALSE 2. FALSE 3. FALSE 4. FALSE 5. TRUE 6. FALSE 7. FALSE 8. FALSE 9. FALSE 10. TRUE 11. TRUE 12. FALSE 13. TRUE 14. FALSE 15. TRUE 16. TRUE 17. FALSE 18. FALSE 19. FALSE 20. TRUE 21. FALSE 22. TRUE 23. FALSE 24. FALSE 25. FALSE 26. TRUE 27. TRUE 28. FALSE


29. TRUE 30. TRUE 31. TRUE 32. FALSE 33. FALSE 34. FALSE 35. TRUE 36. A 37. C 38. A 39. D 40. A 41. A 42. D 43. D 44. C 45. A 46. C 47. B 48. D 49. D 50. C 51. D 52. C 53. D 54. C 55. A 56. B 57. B 58. C 59. C 60. B 61. C 62. D


63. B 64. A 65. C 66. D 67. D 68. B 69. B 70. B 71. C 72. C 73. D 74. A 75. D 76. D 77. C 78. accounts payable 79. vendor invoice 80. purchase returns and allowances 81. debit memorandum 82. voucher 83. accounts payable master 84. AP/CD process 85. treasurer 86. treasurer, controller or controller, treasurer 87. voucher 88. establish payable, make payment or make payment, establish payable 89. vendor invoice 90. vendor invoice 91. disbursement voucher 92. payment due date information 93. payment due date information or "Issue and record disbursements" 94. payment request 95. accounts payable 96. cash disbursements event


97. authorized 98. VENDORS 99. receipt number or Rec_No 100. invoice number or Invoice_No 101. vendors 102. cash planning report 103. vendor invoices 104. accounts payable 105. Purchase returns and allowances 106. Evaluated receipt settlement (ERS) or Evaluated receipt settlement or ERS 107. Electronic invoice presentment and payment (EIPP) or Electronic invoice presentment and payment or EIPP 108. independent validation of vendor invoices 109. match invoice, purchase order and receiving report 110. independent authorization to make payment 111. reconcile bank account

112.


113.

114. 115. NOTE TO INSTRUCTORS: This question repeats the "Make payment" narrative of Problem 3 (in the original banks) but instead of asking students to draw Diagram 2.0 it asks them to identify the missing diagram pieces. 1. 2. 3. 4. 5.

2.1 Prepare proposed payments Proposed payments Accounts payable master data 2.2 Select and record payments Approved payments

6. 7. 8. 9.

Cash disbursements events data 2.3 Issue and record disbursements GL cash disbursements update Vendor payment


116. 117. Missing item A B C D E F G H I

118. System Failure 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Item description 8 3 2 1 7 6 5 4 9

Answer E D C B H F A I G J


Chapter 14--The Human Resources Process (HR) Management and Payroll Processes Student: 1. A job time record is used to calculate the gross amount of each employee's pay. True False

2. Attendance time records reflect the start and stop times on specific jobs to allow the distribution of payroll costs to jobs in process (or to other accounts). True False

3. Attendance time records show the time periods that employees are in attendance at the job site and available for work. True False

4. The imprest payroll account should show a zero balance after both the debit for gross pay paid to employees and the credit for gross pay distributed to jobs in process or to expense categories has been posted to the account. True False

5. An imprest payroll bank account is one to which cash transfers are made in an amount exactly equal to the amount of payroll checks cashed. True False

6. Human capital management is the process of managing how people are hired, trained, assigned, motivated and retained. True False

7. The human capital management process is an interacting structure of people equipment, activities, and controls that supports the repetitive work routines and decision needs of the HR department. True False


8. The payroll process maintains records containing data for payroll taxes and fringe benefits, attendance reporting, timekeeping, and paying employees for work performed. True False

9. The manager of safety, health services and benefits usually reports to the controller. True False

10. The manager of employee and industrial relations helps to settle employee complaints and grievances. True False

11. The manager of safety, health services and benefits has key functions that include plans and forecasts of an organization's short-term and long-term HR needs. True False

12. Systems that allow employees to access their personnel information and related functions are known as human resources self-service systems. True False

13. Data in the employee/payroll master data originates in HR and payroll. True False

14. Factory workers record attendance and job time at a payroll service bureau. True False

15. The skills inventory data maintains data concerning an organization's short-term and long-term staffing requirements. True False

16. The labor-force planning data catalogs each employee's set of relative skills. True False


17. HR self-service systems can reduce HR and payroll-related operational costs up to 85%. True False

18. The chief financial officer usually has direct supervision of the treasurer and controller and indirect supervision of the payroll supervisor. True False

19. The GL supervisor usually reports to the treasurer. True False

20. A payroll service bureau often makes tax and insurance payments for the client. True False

21. The general ledger supervisor is in charge of payroll preparation. True False

22. The cashier is in charge of payroll check disbursement. True False

23. The trigger for the payroll process "pay employees" is the payroll register. True False

24. The data flow between "prepare paychecks" and "prepare disbursement voucher" is the payroll register. True False

25. The employee/payroll master data is the central repository of data about people who work for an organization. True False

26. The employee wage and tax statement is known as a W-4. True False


27. Annuities, pensions, and retirement pay are reported on Form 1099-P. True False

28. Wages taxable under FICA are reported on Form 941. True False

29. An electronic time management system is a computer based system that captures, stores, and reports time. True False

30. A company that specializes in rendering payroll services to client companies for a fee is a payroll service bureau. True False

31. For good internal control, there should be a segregation of duties between personnel data creation/modification, payroll preparation, and disbursement of the checks. True False

32. The control plan "use an imprest bank account" entails having paychecks distributed to employees by an entity not otherwise involved in payroll processing. True False

33. In an imprest system, the bank account is reimbursed for the exact amount of the disbursements made from the fund. True False

34. A payroll clearing account is a separate bank account used solely for payroll purposes. Funds are transferred into the account to cover payroll checks to be issued. True False

35. Moving from bi-weekly to monthly payroll can reduce costs by 30 to 50 percent. True False


36. The process of preparing paychecks for hourly employees is triggered by which of the following data flows? A. validated attendance time cards B. job time tickets C. a temporal event D. employee paychecks

37. Information for distributing labor charges to jobs, departments, or other accounts comes primarily from: A. attendance time cards B. job time tickets C. a temporal event D. employee paychecks

38. In a payroll system logical DFD, all of the following processes likely would provide updates to the general ledger except for: A. reconcile hours worked B. distribute labor costs C. pay employees D. accrue employer taxes

39. The control plan independent reconciliation of payroll bank account is directed primarily at achieving which of the following control goals? A. provide employees with timely pay checks B. ensure efficient employment of resources C. ensure security of resources D. ensure validity, completeness and accuracy of time card inputs

40. Which of the following activities related to payroll is not an effective control plan? A. Paychecks should be drawn on an imprest payroll bank account. B. Approve imprest clearing check. C. Approve attendance time data and job time data. D. After their preparation, paychecks should be delivered directly to the employees' supervisors for distribution to the employees.


41. According to the text, what is the process of managing how people are hired, trained, assigned, motivated and retained and presumes that employees are a strategic investment? A. organizational management B. personnel management C. human capital management D. none of the above

42. Which of the following began with the handling of payroll, personnel administration, and later added the functions of recruiting and employee relations? A. strategic management B. personnel management C. human capital management D. payroll distribution management

43. Which of the following recognized the importance of personnel in achieving organizational objectives, but viewed personnel as something that could be controlled? A. human resource management B. personnel management C. human capital management D. strategic management

44. Which of the following emphasizes an individuals' value to the organization, personnel development to maximize the benefits that an individual can provide to the organization and retention of employees to ensure that important skills are not lost? A. human resource management B. personnel management C. human capital management D. strategic management

45. Which of the following is not part of the information provided by HR management to support management decisions? A. generating a variety of HR forms and documents B. preparing management reports C. preparing governmental reports D. all of these are part of the information provided by HR management


46. Which of the following is false regarding the payroll process? A. it supports the repetitive work routines of the payroll department B. because payroll is a key competency, it typically does not make sense to outsource this process C. it maintains data for payroll taxes and fringe benefits D. moving from bi-weekly to monthly payroll can reduce costs by 30 to 50 percent

47. The HR module in most ERP systems includes all of the following except: A. cafeteria benefits administration B. compliance reporting C. skills inventories D. strategic and tactical planning

48. Including HR data within the enterprise system allows sharing of common data providing benefits except: A. creating a single source for obtaining HR information B. increased data redundancy C. improving data accuracy D. ensuring data integrity and consistency

49. The key functions of planning and forecasting HR needs, analyzing jobs to determine required skills, assisting in recruiting, and helping new hires adjust to their work environment is the job position of the manager of: A. personnel appraisal and development B. employee and industrial relations C. HR systems D. personnel planning and staffing

50. The key functions of handling employee complaints and negotiating with unions is the job position of the manager of: A. personnel appraisal and development B. employee and industrial relations C. HR systems D. personnel planning and staffing

51. The key functions of ensuring that the information needs of HR managers and staff workers are satisfied and serving as the liaison between the IT department and the HR department is the job position of the manager of: A. personnel appraisal and development B. employee and industrial relations C. HR systems D. personnel planning and staffing


52. The key functions of assisting managers in setting rewards for good employee performance, helping line managers provide training or take disciplinary action, and reducing employee turnover by helping workers achieve their career goals is the job position of the manager of: A. personnel appraisal and development B. employee and industrial relations C. HR systems D. personnel planning and staffing

53. Which of the following is not one of the HR related events performed by the HR management process? A. selecting employees B. paying employees C. evaluating employees D. terminating employees

54. Inputs to the HR management process are provided by: A. various departments B. Employees C. HR department D. all of the above

55. With an enterprise system, updates of employee/payroll master data is performed by: A. various departments B. Employees C. Computer D. HR department

56. In an HR management process, needs requests, supervisor review, employee termination, and employee requests are approved by: A. various departments B. Employees C. Computer D. HR department

57. Payroll reports may be provided to all of the following except: A. Unions B. Employees C. Government D. Customers


58. Which of the following data stores is updated when employees gain new on the job training? A. labor-force planning data B. skills inventory data C. payroll data D. none of the above

59. Which of the following data stores is updated for job specifications? A. labor-force planning data B. skills inventory data C. payroll data D. termination data

60. The payroll supervisor usually reports directly to: A. the treasurer B. the cashier C. the controller D. the VP Finance

61. For good internal control an organization should segregate the duties of: A. HR and payroll B. AP and payroll C. payroll and cashier D. all of the above

62. Which of the following shows when employees are at work, may be maintained near the entrance of the workplace and take the physical form of cards? A. attendance time records B. job time records C. payroll contribution notice D. none of the above

63. Which of the following shows start and stop times on specific job with the purpose of allowing the distribution of payroll costs to work in process? A. attendance time records B. job time records C. payroll contribution notice D. wage and tax forms


64. Which of the following is a data flow that generally goes to insurance companies? A. attendance time records B. job time records C. payroll contribution notice D. employee vacation pay form

65. Which of the following is a data flow that generally goes to government agencies? A. attendance time records B. job time records C. payroll contribution notice D. payroll tax reports

66. Payroll processing is typically conducted in: A. immediate mode B. periodic mode C. batches D. both b and c

67. Payroll tax reports are initially remitted to: A. government agencies B. the bank C. the general ledger process D. the cashier

68. Updates of the tax rates data are stored in: A. tax rates data B. employee/payroll master data C. HR master data D. GL master data

69. What is the process that compares total hours of each worker as shown by the attendance record with the hours reflected on the job time records for that employee? A. accrue employer taxes B. distribute labor costs C. reconcile hours worked D. pay employees


70. What is the process that interfaces with the GL to provide the necessary journal entries for the distribution of labor charges? A. accrue employer taxes B. distribute labor costs C. reconcile hours worked D. pay employees

71. What is the process that is initiated by validated attendance time records? A. accrue employer taxes B. distribute labor costs C. reconcile hours worked D. pay employees

72. Which of the following is processed in batches? A. HR activities B. Payroll C. both a and b D. neither a or b

73. Which of the following is processed in the immediate mode? A. HR activities B. Payroll C. both a and b D. neither a or b

74. Which of the following is an example of processing the company's payroll for a fee? A. electronic time management B. payroll direct deposit system C. payroll service bureau D. payroll register

75. Which of the following has the inputs of attendance and work on specific jobs? A. electronic time management B. payroll direct deposit system C. payroll service bureau D. GL master data


76. The payroll register is used to: A. record time worked B. record hours worked on specific jobs C. prepare a payroll disbursement voucher D. prepare and disburse employee paychecks

77. The approved payroll disbursement voucher is used to: A. record time worked B. record hours worked on specific jobs C. prepare and disburse employee paychecks D. prepare a payroll transfer check

78. Which of the following payroll-related frauds may involve non-existent employees? A. ghost employees B. falsified hours and salary C. commission schemes D. false workers' compensation claims

79. Which of the following payroll-related frauds can have a direct impact on the organization's insurance company? A. ghost employees B. falsified hours and salary C. commission schemes D. false workers' compensation claims

80. Employee fraud schemes in the area of reimbursement of expenses include all of the following except: A. overstating expenses B. fake receipts C. overstating commissions D. using personal expenses as business expenses

81. Which of the following control plans transfers the exact amount of funds necessary to reimburse the account for payroll checks cashed? A. approve attendance time data and job time data B. use payroll clearing account C. independent paycheck distribution D. imprest payroll bank account


82. Which of the following control plans will detect discrepancies between the attendance time and job time? A. approve attendance time data and job time data B. distribute labor costs C. independent paycheck distribution D. use payroll clearing account

83. Which of the following control plans is an account used solely for payroll purposes and funds are transferred into the account to cover payroll checks to be issued? A. approve attendance time data and job time data B. use payroll clearing account C. independent paycheck distribution D. imprest payroll bank account

84. In some organizations, employees "punch" in and out of work by swiping an employee identification card through or by a(n) .

85. reflect(s) the start and stop times on specific jobs to allow the distribution of payroll costs to jobs in process (or to other accounts).

86. and available for work.

show the time periods that employees are in attendance at the job site

87. The is an account used solely for payroll purposes. Funds are transferred into the account to cover payroll checks to be issued.

88. motivated and retained.

is the process of managing how people are hired, trained, assigned,


89. The process is an interacting structure of people, equipment, activities, and controls that supports the repetitive work routines and decision needs of the HR department

90. The process maintains data for payroll taxes, fringe benefits, attendance reporting, timekeeping, and paying employees for work performed.

91. The manager of safety, health, and human services usually reports to the .

92. The manager of

93. The HR needs.

handles employee complaints.

plans and forecasts an organization's short-term and long-term

94. Systems that allow employees to access their personnel information and business-related information and functions are known as human resources .

95. The HR and payroll processes share data in the

master data.

96. The long-term staffing requirements.

data maintains data concerning an organization's short-term and

97. The

data catalogs each employee's set of relative skills.


98. A payroll

often makes tax and insurance payments for the client.

99. The chief financial officer usually has direct supervision of the treasurer and .

100. The GL supervisor usually reports to the

.

101. Payroll is typically processed in the

mode.

102. The trigger for the payroll process "pay employees" is (are) validated .

103. The data flow between "prepare paychecks" and "prepare disbursement voucher" is the .

104. The work for the organization.

master data is the central repository of data about people who

105. The employee wage and tax statement is known as a(n)

106. Annuities, pensions, and retirement pay are reported on Form

.

.


107. Wages taxable under FICA are reported on Form

108. A(n) reports time.

.

system is a computer based system that captures, stores, and

109. A company that specializes in rendering payroll services to client companies for a fee is a(n) .

110. company but who receive paychecks.

employees are employees who do not currently work for the

111. For good internal control, there should be a(n) data creation/modification, payroll preparation, and disbursement of the checks.

between personnel

112. The control plan , entails having paychecks distributed to employees by an entity not otherwise involved in payroll processing.

113. A(n) account is used solely for payroll purposes. Funds are transferred into the account to cover payroll checks to be issued.

114. To transfer funds from the company's general account to its payroll bank account, the payroll register is sent to the department.


115. of the payroll bank account helps ensure the safety of resources (cash) by identifying missing or unusual items entered into the account.

116. In a(n) exact amount of the paychecks cashed.

bank account funds are transferred into the account for the

117. TB Figure 14.1 is a Level 0 DFD of a payroll process with several labels omitted. Listed below is a numbered, alphabetical list of the omitted items.

Omitted Labels 1. 2. 3. 4. 5. 6.

Accrue liabilities Attendance time records Bank Distribute labor costs Employee/payroll master data General ledger process

7. 8. 9. 10. 11. 12.

GL employer tax accrual update GL tax deposit update Government agencies Pay employees Perform data maintenance Validated job time records


Required: Match each letter in the Level DFD to the appropriate number from the list of omitted labels.


118. Below is a narrative for the "Pay employees" portion (bubble 4.0) of the payroll process described in Chapter 14. Narrative Description Validated attendance time records initiate the payment to workers in process 4.0 (Pay employees). In calculating employees' gross and net pay, Process 4.1 (Prepare paychecks) retrieves data from both the employee/payroll master data and the tax rates data. Process 4.1 accumulates current, quarter-to-date, and year-to-date totals for each employee and reports this information via the data flow "Payroll register." This information also is used to update the employee/payroll master data. Finally, process 4.1 prints and distributes paychecks to employees as reflected in the "Employee paychecks" data flow. The data flow "Payroll register" triggers process 4.2 (Prepare disbursement voucher). This will result in a data flow for the GL disbursement voucher update and a data flow for the disbursement voucher. Process 4.3 (Prepare payroll transfer check) and sends the check to the bank to cover the organization's periodic net payroll. Required: From the DFD in TB Figure 14.2 and the narrative description above, explode bubble 4.0 into a lower level diagram showing the details of that process.


119. Below is a narrative for the "Pay employees" portion (bubble 4.0) of the payroll process described in Chapter 14. Narrative Description Validated attendance time records initiate the payment to workers in process 4.0 (Pay employees). In calculating employees' gross and net pay, Process 4.1 (Prepare paychecks) retrieves data from both the employee/payroll master data and the tax rates data. Process 4.1 accumulates current, quarter-to-date, and year-to-date totals for each employee and reports this information via the data flow "Payroll register." This information also is used to update the employee/payroll master data. Finally, process 4.1 prints and distributes paychecks to employees as reflected in the "Employee paychecks" data flow. The data flow "Payroll register" triggers process 4.2 (Prepare disbursement voucher). This will result in a data flow for the GL disbursement voucher update and a data flow for the disbursement voucher. Process 4.3 (Prepare payroll transfer check) and sends the check to the bank to cover the organization's periodic net payroll. Required: Using the DFD in TB Figure 14.4 and the narrative description above, identify the words that belong in items 1 to 11 of Diagram 4.0 (TB Figure 14.5).


120. Assume you are working with a payroll application that produces weekly paychecks, including paystubs. Listed below are 20 data elements that appear on the paycheck/paystub.

Data Elements Number 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

Description Employee identification number Social security number Employee name Employee address Regular hours worked Overtime hours worked Pay rate classification Hourly pay rate Regular earnings Overtime earnings Total earnings Deduction for federal income tax Deduction for state income tax Deduction for FICA tax Union dues withheld (flat amount based on length of service) Net pay Check number (same number is also preprinted on each check form) Year-to-date amounts for items 11 through 14 preceding Pay-period end date Date of check (employees are paid on Wednesday for the week ended the previous Friday)

Required: For each numbered item, indicate the immediate (versus ultimate) source of the item. For instance, the immediate source of the number of exemptions for an employee would be the employee master file as opposed to the ultimate source which is the W-4 form filed by the employee. Some items may have more than one source, as in the case of item 1. You have the following choices: E T

= =

H W

= =

CG CC CO

= = =

Employee master file Time clock cards (these are in machine-readable form and show for each employee for each day the time punched in the morning, out at lunch, in after lunch, and out in the evening) "Table" file of hourly wage rates (i.e., wage rate "class" and hourly rate for each class) "Table" file of state and federal income tax withholding amounts plus FICA tax rate and annual "cutoff" amount for FICA wages. Computer generated (such as a date or time of day supplied by the system) Computer calculated Console operator (such as batch totals or a date to be used)

Arrange your answer as follows: Item 1 2 etc.

Source T, E ?


121. The following is a list of 10 control plans.

Control Plans A. B. C. D. E.

Independent paycheck distribution Reconcile bank account Tickler file of employees due for periodic performance reviews. Reconcile attendance time data and attendance time data Electronic time management system

F. G. H. I. J.

Payroll service bureau Payroll clearing account Reconcile run-to-run totals Approve job time data HR self-service system

Required: Listed below are ten system failures that indicate weaknesses in control. On the answer line to the left of each description, insert the capital letter (from the list above) of the best control plan to address the system deficiency described. A letter should be used only once. Answers

SYSTEM FAILUR ES 1. 2.

3. 4. 5. 6. 7. 8. 9. 10.

Grover Company was experiencing cost overruns on several construction projects. An investigation seemed to indicate that workers were recording more hours to some jobs than they actually worked on those jobs. Some project managers at Gecko Consultants are having trouble understanding why there are cost overruns on their projects. They suspect that some staff are mistakenly recording hours worked to their projects and not to other managers' projects. Management at Duclos Company suspects that some supervisors are submitting attendance time records, and collecting the paychecks, for employees that don't exist. Payroll checks being cashed at Bemidji Company are greater than the amount of the checks issued. Randy, the owner of Winsted Company, suspects that his accountant is making unauthorized disbursements. Employees at Farmington, Inc. are complaining that they cannot easily view and make changes to their retirement plans. Employees at Kindle, Inc are unclear as to how well they are doing in their jobs. Beverly, the new CFO at Florida Company, believes that the process of collecting attendance and job time data is inefficient. The initial calculations for employee payments at Garfield Inc. do not agree with the payments recorded and made. The controller at Blanford Company believes that the present payroll process is inefficient and error-prone. For example, they have trouble keeping up with changing tax and benefits regulations.


Chapter 14--The Human Resources Process (HR) Management and Payroll Processes Key

1. FALSE 2. FALSE 3. TRUE 4. FALSE 5. TRUE 6. TRUE 7. FALSE 8. TRUE 9. FALSE 10. TRUE 11. FALSE 12. TRUE 13. TRUE 14. FALSE 15. FALSE 16. FALSE 17. TRUE 18. TRUE 19. FALSE 20. TRUE 21. FALSE 22. TRUE 23. FALSE 24. TRUE 25. TRUE 26. FALSE 27. FALSE 28. TRUE


29. TRUE 30. TRUE 31. TRUE 32. FALSE 33. TRUE 34. TRUE 35. TRUE 36. A 37. B 38. A 39. C 40. D 41. C 42. B 43. A 44. C 45. D 46. B 47. D 48. B 49. D 50. B 51. C 52. A 53. B 54. D 55. C 56. D 57. D 58. B 59. A 60. C 61. D 62. A


63. B 64. C 65. D 66. D 67. A 68. A 69. C 70. B 71. D 72. B 73. A 74. C 75. A 76. C 77. D 78. A 79. D 80. C 81. D 82. B 83. B 84. magnetic card reader 85. Job time records 86. Attendance time records 87. payroll clearing account 88. Human capital management or Human capital management (HCM) or HCM 89. human resources management or human resources (HR) management or HR management 90. payroll 91. vice president of human resources or vice president (VP) of human resources (HR) or VP of HR or VP of human resources (HR) or VP of human resources or vice president of HR 92. employee and industrial relations 93. manager of personnel planning and staffing 94. self-service systems 95. employee/payroll 96. labor-force planning


97. skills inventory 98. service bureau 99. controller 100. controller 101. periodic 102. attendance time records 103. payroll register 104. employee/payroll 105. W-2 106. 1099-R 107. 941 108. electronic time management 109. payroll service bureau 110. Ghost 111. segregation of duties 112. independent paycheck distribution 113. payroll clearing 114. accounts payable 115. Independent reconciliation 116. imprest payroll 117. A. B. C. D. E. F.

11 2 5 12 4 1

G. H. I. J. K. L.

10 3 7 6 8 9


118. 119. NOTE TO INSTRUCTORS: This question repeats the "Pay employees" narrative of Problem 2 (in the original banks) but instead of asking students to draw Diagram 4.0 it asks them to identify the missing diagram pieces. 1. 2. 3. 4. 5. 6.

120. Item No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.

Tax rates data Validated attendance time records Employee paychecks 4.1 Prepare paychecks Employee/payroll master data Payroll register

7. 8. 9. 10. 11.

GL disbursement voucher update 4.2 Prepare disbursement voucher Payroll transfer check Disbursement voucher 4.3 Prepare payroll transfer check

Description Employee identification number Social security number Employee name Employee address Regular hours worked Overtime hours worked Pay rate classification Hourly pay rate Regular earnings Overtime earnings Total earnings Deduction for Federal Income Tax Deduction for State Income Tax Deduction for FICA tax Union dues withheld (flat amount based on length of service) Net pay Check number (same number is also preprinted on each check form) Year-to-date amounts for items 11 through 14 above Pay period ending Date of check (employees are paid on Wednesday for the week ended the previous Friday)

Source T, E E T, E E T, CC T, CC E H CC CC CC W, CC W, CC W, CC E, CC CC CG, CO E, CC CG, CO CC, CO


121. System Failure 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.

Answer D I A G B J C E H F


Chapter 15--Integrated Production Processes (IPP) Student: 1. Production systems facilitate integration of all aspects of product design, manufacturing, and marketing processes. True False

2. Product lifecycle management (PLM) systems are ERP modules or enterprise system add-ons that organize data by product, including designs, manufacturing specifications, quality, and warranty performance. True False

3. Cycle time is the time it takes from when authorization is made for goods to be produced to when the goods are completed. True False

4. In the pull approach to manufacturing, the sales forecast drives the production plan and goods are produced in large batches. True False

5. Theoretically, in the push approach to manufacturing, each job consists of a batch of one unit. True False

6. With the pull approach to manufacturing, factory machinery is arranged in clusters or cells. True False

7. Supply chain management software provides available to promise planning and capable to promise planning. True False

8. A process costing is a costing approach where detailed costs to perform activities throughout the value chain are computed and can be managed or assigned to cost objects, including products. True False


9. Cost drivers measure the amount of an activity performed to explain activity costs. True False

10. Lifecycle costs are the sum of costs to design, produce, market, deliver, and support a product from conception to ultimate discontinuance. True False

11. Global competition and the enormous buying power of "mega-retailers", many companies have been forced to move operations across their value chains throughout the globe to reduce costs. True False

12. The computer technology application that automates the product design process, including but not limited to the functions of geometric modeling, materials stress and strain analysis, drafting, storing product specifications, and mechanical simulation of a product's performance, is called CAD/CAE. True False

13. The inventory production schedule is a statement of specific production goals developed from forecasts of demand, actual sales orders, or inventory information. True False

14. Materials requirements planning is a process that uses bills of material, raw material and WIP inventory status data, open order data, and the master production schedule to calculate a time-phased order requirements schedule for materials and subassemblies. True False

15. Continuous inventory management is an inventory management approach where inventory needs and production capabilities are matched across the entire global enterprise. True False

16. The capacity requirements planning (CRP) process uses information from the master production schedule and the time-phased order requirements schedule to develop detailed machine- and labor-use schedules based on available capacity. True False


17. Purchase orders convey authority for the manufacture of a specified product or subassembly in specified quantity and describe the material, labor, and machine requirements for the job. True False

18. Manufacturing resource planning (MRP) is an integrated decision support system for planning, executing, and controlling manufacturing operations. True False

19. JIT is a manufacturing philosophy or business strategy for designing production processes that are more responsive to precisely timed customer delivery requirements. True False

20. An assembly line manufacturing system is a highly automated computer integrated manufacturing system that has its goal of achieving the ability to quickly produce wide varieties of products using the same equipment. True False

21. Computer-aided manufacturing (CAM) is the application of computer and communications technology to improve productivity by linking computer numerical control (CNC) machines, monitoring production, and providing automatic feedback to control operations. True False

22. Computer-aided process planning (CAPP) is an automated decision support system that generates manufacturing operations instructions and routings based on information about machining requirements and machine capabilities. True False

23. An automated storage and retrieval system (AS/RS) is a computer-based cart system capable of delivering parts and tools among multiple work centers. True False

24. An automated storage and retrieval system (AS/RS) is a computer-controlled machine that stores and retrieves parts and tools. True False


25. JIT is often called a kanban process. True False

26. A bill of material contains the standard material quantities that are required to produce one unit of end product. True False

27. The process of exploding the BOM involves extending a BOM to determine the total of each component required to manufacture a given quantity of an upper-level assembly or subassembly. True False

28. The process of exploding the BOM results in a master production schedule. True False

29. The shop floor control process is devoted to monitoring and recording the status of manufacturing orders as they proceed through the factory. True False

30. A step master shows the necessary steps and the time to complete each operation to produce a product. True False

31. The material, labor, and machine requirements for each job are reflected in a manufacturing order. True False

32. Capable to promise planning is the accumulation of the data on current inventories, sales commitments, and planned production to determine whether the production of finished goods will be sufficient to commit to additional sales orders. True False

33. Available to promise planning is the accumulation of data on current inventories, sales commitments, planned production and excess production capacity or other planned production capacity that could be quickly converted to production of the desired finished goods necessary to fulfill a sales order request. True False


34. Variance analysis is the process of comparing actual information about input costs and usage to standards. True False

35. The final move ticket data marks the end of the conversion process and the movement of goods to the finished goods warehouse. True False

36. Which of the following is not one of the key characteristics of companies that are successful at managing the pressures resulting from global complexity according to the Deloitte Touche report? A. improved internal business processes in the areas of customers, products, and supply chains B. better use of technology to increase integration within and among the areas of customers, products and supply chain C. pursuit of new lucrative marketing channels D. better general capabilities in the areas of collaboration, flexibility, visibility, and technology

37. Which of the following is not one of the key drivers of complexity in manufacturing operations in the new millennium according to the Deloitte Touche survey? A. facing the realities of globalization B. the quickening pace of product innovation C. pursuit of new lucrative markets and channels D. pressure to reduce costs throughout the value chain

38. Designing ground-breaking products and getting them to market quickly is an example of: A. product innovation B. production process innovation C. supply chain management D. management accounting systems

39. Which of the following has included management of throughput time and pull manufacturing? A. product innovation B. production process innovation C. supply chain management D. management accounting systems


40. Which of the following is impacted by flexible costing systems, activity-based costing, shift in cost structure from variable to fixed costs, and reduced direct labor cost component in manufacturing? A. product innovation B. production process innovation C. supply chain management D. management accounting systems

41. Which of the following is an ERP add on system that organizes data by product, including designs, manufacturing specifications, quality and warranty performance? A. product lifecycle management B. throughput C. push manufacturing D. pull manufacturing

42. Which of the following involves measuring the time from authorization of goods to be produced to when the goods are completed? A. product lifecycle management B. throughput time C. push manufacturing D. pull manufacturing

43. Which of the following involves short production runs, continuous flow of operations, cellular manufacturing, reduced floor space, and reduced WIP? A. product lifecycle management B. throughput time C. push manufacturing D. pull manufacturing

44. Prevailing trends in production systems reflect all of the following except: A. emphasis on customer satisfaction B. shortened product lifecycles C. increased factory automation D. the change from "pull" to "push" production scheduling


45. Which of the following statements is true? A. Japanese companies have accomplished much in the area of production process innovation, mainly by switching from pull to push manufacturing. B. Cellular manufacturing organizes machines by department. C. Adopting the pull approach to manufacturing requires an increase in floor space. D. In the push approach to manufacturing, the sales forecast drives the production plan, and goods are produced in large batches.

46. Which of the following statements is false? A. With the pull approach to manufacturing, factory machinery typically is arranged in factory cells. B. The pull approach to manufacturing should lead to reduced work in process and finished goods inventories. C. The pull approach to manufacturing should lead to shorter production runs. D. Enterprise resource planning (ERP) employs a pull approach to manufacturing.

47. Pull manufacturing should lead to all of the following except: A. short production runs B. increased work in process and finished goods inventories C. continuous flow operations D. a cellular arrangement of factory machinery

48. Trends in cost management/cost accounting include all of the following except: A. reductions in the administrative costs of gathering data B. a trend toward job order cost systems and away from process cost systems C. adding a fourth cost category called direct technology D. reduction in the direct labor cost component

49. Performing a detailed analysis of cost per unit and cost drivers is an essential prerequisite for using: A. concurrent engineering B. activity-based costing C. computer-integrated manufacturing D. flexible manufacturing

50. Activity-based-costing (ABC) systems are generally prevalent in companies seeking to increase . A. cost accuracy and usefulness B. cost accumulation and cost assignment C. cost allocation and cost containment D. product costing and cost allocation

and


51. The Level 0 data flow diagram for the integrated production process includes all of the following process bubbles except: A. design product and production processes B. generate master distribution schedule C. determine needs for materials D. record manufacturing events

52. The objectives of computer-aided design (CAD) and computer-aided engineering (CAE) are all of the following except: A. improve design productivity B. reduce design lead time C. increase redundant design effort D. enhance design quality

53. Which of the following often includes global inventory management? A. design product and production processes B. generate master production schedule C. determine needs for materials D. develop detailed production instructions

54. Which of the following lists the detailed specifications for each raw materials item? A. parts master B. routing master C. work center master D. bill of materials

55. Which of the following specifies the operations necessary to complete a subassembly or finished good and the sequence of operations? A. parts master B. routing master C. work center master D. bill of materials

56. Which of the following is a statement of specific production goals developed from forecasts of demand, actual sales orders, or inventory information? A. a master production schedule (MPS) B. materials requirements planning (MRP) C. shop floor control (SFC) D. just-in-time (JIT) manufacturing


57. The objectives of just-in-time (JIT) manufacturing usually include all of the following except: A. large lot sizes B. zero defects C. zero setup times D. zero lead times

58. The implementation features of just-in-time (JIT) manufacturing typically include all of the following except: A. arranging the factory in work cells B. assigning each worker to a single machine C. allowing workers to stop the production line D. requiring that the daily production schedule remain fairly constant

59. Which of the following components is not part of a flexible manufacturing system (FMS)? A. manufacturing resource planning (MRP) B. Computer-aided manufacturing (CAM) C. automated storage and retrieval systems(AS/RS) D. automated guided vehicle systems (AGVS)

60. Which of the following develops detailed machine- and labor-use schedules that consider available capacity? A. capacity requirements planning (CRP) B. capable to promise planning (CTP) C. computer-aided process planning (CAPP) D. computer-aided manufacturing (CAM)

61. What conveys authority for the manufacture of a specified product or subassembly in a specified quantity and describe the material, labor, and machine requirements for the job? A. capacity requirements planning (CRP) B. manufacturing orders (MO) C. capable to promise planning (CTP) D. computer-aided process planning (CAPP)

62. Materials requirements planning (mrp) normally would use all of the following inputs except: A. master production schedule (MPS) B. bill of materials C. routing file D. raw materials inventory status data


63. This shows when a manufacturing order or purchase order should be released so that the subassemblies and raw materials will be available when needed. A. bill of materials B. routing sheet C. time-phased order requirements schedule D. parts master file

64. The process of comparing actual information about input costs and usage to standards is: A. standard costing B. process costing C. variance analysis D. Activity-based costing

65. The raw material quantity variance can be determined by: A. an excess RM issue notice B. a RM returned notice C. both a and b D. none of the above

66. Inventory process controls to protect inventory assets include: A. warehouse bin location B. periodic physical inventory counts C. internal transfer procedures D. Just-in-time materials acquisition

67. Which of the following inventory frauds is not identified by Practice Alert No. 94-2: Auditing Inventories¾Physical Observations? A. double-counting inventory B. counting obsolete inventory as salable C. including inventory for which the corresponding payable has not been recorded D. employee theft of inventory item having high sales volume

68. The AICPA's Practice Alert No. 94-2: Auditing Inventories¾Physical Observations describes several circumstances that constitute inventory fraud. Which of the following is not an example of inventory fraud? A. including items in inventory when the corresponding payable has not been recorded B. adjusting inventory to lower-of-cost-or-market C. increasing counts for items that auditors did not test count D. counting obsolete inventory as salable or usable


69. Which of the following is not an inventory process control? A. JIT materials acquisition B. locked storerooms C. periodic inventory systems D. physical counts

70. Sales forecasts drive the production plan and goods are produced in large batches with this type of manufacturing: A. pull B. push C. JIT D. SCM

71. Production is initiated as individual sales orders are received with this type of manufacturing: A. pull B. push C. JIT D. SCM

72. The entire design process is automated through the use of: A. AS/RS B. AGVS C. CAD/CAE D. CAM

73. Which is a listing of all the subassemblies, parts, and raw materials that go into a parent assembly showing the quantity of each that is required to make an assembly? A. bill of materials B. time-phased order requirements schedule C. routing master D. master production schedule

74. The total quality control (TCQ) approach places responsibility for quality control in the hands of the: A. shop floor control process B. managerial accountant C. inspector D. builder


75. manufacturing, and marketing.

systems facilitate the integration of all aspects of product design,

76. are ERP modules or enterprise systems add-ons that organize data by product, including designs, manufacturing specifications, quality, and warranty performance.

77. is the time it takes from when authorization is made for goods to be produced to when the goods are completed.

78. In the approach to manufacturing, the sales forecast drives the production plan and goods are produced in large batches.

79. Theoretically, in the batch of one unit.

approach to manufacturing, each job consists of a

80. With the pull approach to manufacturing, factory machinery is arranged in .

81. Supply chain management software provides to promise planning.

to promise planning and

82. is a costing approach where detailed costs to perform activities throughout the value chain are computed and can be managed or assigned to cost objects, including products.


83. are the sum of costs to design, produce, market, deliver, and support a product from conception to ultimate discontinuance.

84. A(n) is a sequence of activities performed by an organization that add value or utility to the product produced or service rendered.

85. The computer technology application that automates the product design process, including but not limited to the functions of geometric modeling, materials stress and strain analysis, drafting, storing product specifications, and mechanical simulation of a product's performance, is called .

86. The is a statement of specific production goals developed from forecasts of demand, actual sales orders, or inventory information.

87. is a process that uses bills of material, raw material and WIP inventory status data, open order data, and the master production schedule to calculate a time-phased order requirements schedule for materials and subassemblies.

88. is an inventory management approach where inventory needs and inventory production capabilities are matched across the entire global enterprise.

89. The process uses the information from the master production schedule and the time-phased order requirements schedule to develop detailed machine- and labor-use schedules based on available capacity.

90. convey authority for the manufacture of a specified product or subassembly in specified quantity and describe the material, labor, and machine requirements for the job.


91. controlling manufacturing operations.

is an integrated decision support system for planning, executing, and

92. is a manufacturing philosophy or business strategy for designing production processes that are more responsive to precisely timed customer delivery requirements.

93. A(n) is an automated manufacturing operations system that can react quickly to product and design changes because a centralized computer control provides real-time routing, load balancing, and production scheduling logic.

94. is the application of computer and communications technology to improve productivity by linking computer numerical control (CNC) machines, monitoring production, and providing automatic feedback to control operations.

95. is an automated decision support system that generates manufacturing operations instructions and routings based on information about machining requirements and machine capabilities.

96. A(n) among multiple work centers.

is a computer-based cart capable of delivering parts and tools

97. A(n) and tools.

is a computer-controlled machine that stores and retrieves parts

98. another.

authorize and record movement of a job from one work center to


99. A(n) produce one unit of end product.

contains the standard material quantities that are required to

100. The process of involves determining the total of each component required to manufacture a given quantity of an upper-level assembly or subassembly.

101. The process of exploding the BOM results in a(n) schedule.

requirements

102. The process is devoted to monitoring and recording the status of manufacturing orders as they proceed through the factory.

103. The specifies the operations necessary to complete a subassembly or finished good and the sequence of these operations.

104. Used in conjunction with a perpetual inventory process, assists in protecting materials, work-in-process, and finished goods inventory by providing the warehouse manager or the inventory control supervisor with a record of the actual (on-hand) balance of each item of inventory.

105. is accumulation of the data on current inventories, sales commitments, and planned production to determine whether the production of finished goods will be sufficient to commit to additional sales orders.

106. is the accumulation of data on current inventories, sales commitments, planned production and excess production capacity or other planned production capacity that could be quickly converted to production of the desired finished goods necessary to fulfill a sales order request.


107. usage to standards.

is the process of comparing actual information about input costs and

108. goods to the finished goods warehouse.

data marks the end of the conversion process and the movement of

109. tags can be attached to inventory items to track their movement throughout the warehouse and even through the entire supply chain.

110. A(n) is an authorization that identifies the type and quantity of materials to be withdrawn from the storeroom and tracks the manufacturing order being produced and the work center needing the materials.

111. The approach to manufacturing places responsibility for quality in the hands of the builder rather than in those of the inspector.

112. The describes each work center available for producing products, including information such as the machine available at the station, its capacity, its maintenance requirements, labor needs to operate it, and so on.

113. A(n) it could be a machine or a workbench.

is the assigned location where a worker performs his or her job;

114. A(n)

is a group of similar workstations.


115. The process within TB Figure 15.1 Bubble 1.0 might be described as follows: Consistent with the value chain concept, the IPP begins with the design of the product and production processes. Activity-based costing can be used to develop estimates of the future cost of producing new products as well as potential cost changes from product or design changes. The entire design process is automated through the use of computer-aided design (CAD) and computer-aided engineering (CAE). With the use of enterprise systems, the electronic designs produced using CAD/CAE become the basis for developing detailed production schedules (bubble 2.0 in TB Figure 15.1) as well as the electronic control of production machines. In addition to the detailed product design, the CAD/CAE process results in several data stores of information that are used later in the IPP: · ·

·

·

Bill of materials (BOM) master: The BOM provides the basis for later orders of raw materials (bubble 3.0 in TB Figure 15.1) when a finished good is to be produced. Part master: The parts master or raw materials inventory master lists the detailed specifications of each raw materials item. An engineer must specify the information for the new material in the parts master when a new part is used in product design. Often, existing parts will be used in new products to reduce needed ordering and carrying costs for the inventory. Routing master: The routing master specifies the operations necessary to complete a subassembly or finished good, and the sequence of these operations. The routing master also includes the machining tolerances; the tools, jigs, and fixtures required and the time allowed for each operation. The routing master is vital to developing detailed production instructions (bubble 4.0 in TB Figure 15.1). Computer aided process planning (CAPP), is often used in developing the routing master for developing new products. CAPP is an automated decision support system that generates manufacturing operations instructions and routings based on information about machinery requirements and capabilities. Work center master: The work center master describes each work center available for producing products. A work station is the assigned location where a worker performs their job. A group of similar work stations constitutes a work center. When new products require new machines or production activities, a new record in the work center master must be created.


Refer to TB Figure 15.1. Prepare a Level 1 data flow diagram for the product and production process design process only.


116. The process within TB Figure 15.3, Bubble 3.0 might be described as follows: After the master production schedule is determined, an important step in completing the production in a timely manner is identifying, ordering, and receiving materials. Materials requirements planning is a process that uses bills of material, raw material and WIP inventory status data, open order data, and the master production schedule to calculate a time-phased order requirements schedule for materials and subassemblies. The schedule shows the time period when a manufacturing order or purchase order should be released so that the subassemblies and raw materials will be available when needed. The process involves working backward from the date production is to begin to determine the timing for manufacturing subassemblies and then moving back further to determine the date that orders for materials must be issued into the purchasing process. In an enterprise system, this process is performed automatically, using a variety of data from the enterprise database including: · · · ·

Bills of materials, showing the items and quantities required as developed by engineering. Parts master data, which contains information about part number, description, unit of measure, where used, order policy, lead time, and safety stock. Raw materials and WIP inventory status data showing the current quantities on hand, and quantities already reserved for production for the materials and subassemblies. Open purchase order data showing the existing orders for materials.


The process begins by exploding the bill of materials to determine the total of each component required to manufacture a given quantity of an upper level assembly or a subassembly specified in the master production schedule. Based on lead time data for producing and ordering materials and subassembly requirements are output in a time-phased order requirements schedule. Based on this schedule, and open PO data, purchase requisitions are generated and sent to purchasing. Required: Refer to TB Figure 15.3. Prepare a Level 1 data flow diagram for the materials requirements planning process only.


117. TB Figure 15.5 displays a Level 0 DFD - Cost Accounting: Variance Analysis. Match the items in the following alphabetical list to the missing items (A - J) in the diagram.

1. 2. 3. 4. 5.

Budgets master data Close manufacturing orders Compute MOH variances Compute RM quantity variance DL variances report

6. 7. 8. 9. 10.

Employee/payroll master data General ledger process GL standard costs applied update Inventory process Production work centers


118. Match the terms in the left column below with the definitions in the right column by placing the letter next to the term in the blank space next to the definition.

Term A.

Definition Push manufacturing

1.

B.

Throughput time

2.

C.

Parts master

3.

D.

Master production schedule (MPS)

4.

E.

Available to promise planning

5.

F.

Pull manufacturing

6.

G.

Bill of materials (BOM)

7.

H.

Work center master

8.

I. J.

Routing master Capable to promise planning

9. 10.

The time it takes from when authorization is made for goods to be produced to when the goods are completed. The accumulation of the data on current inventories, sales commitments, and planned production to determine whether the production of finished goods will be sufficient to commit to additional sales orders. A listing of all the subassemblies,parts, and raw materials that go into a parent assembly showing the quantity of each that is required to make an assembly. Describes stationsavailable for producing products, including information such as the machine available at the station, its capacity, its maintenance requirements, labor needs to operate it, and so on. The accumulation of the data on current inventories, sales commitments, planned production and excess production capacity, or other planned production capacity that could be quickly converted to production of the desired finished goods necessary to fulfill a sales order request. Process for which the sales forecast drives the production plan, and goods are produced in large batches. Specifies the operations necessary to complete a subassembly or finished good and the sequence of these operations. A statement of specific production goals developed from forecasts of demand, actual sales orders, or inventory information. Lists the detailed specifications for each raw materials item. This process is initiated as individual sales orders are received and theoretically each job consists of a "batch" of one unit.


Chapter 15--Integrated Production Processes (IPP) Key

1. FALSE 2. TRUE 3. FALSE 4. FALSE 5. FALSE 6. TRUE 7. TRUE 8. FALSE 9. TRUE 10. TRUE 11. TRUE 12. TRUE 13. FALSE 14. TRUE 15. FALSE 16. TRUE 17. FALSE 18. TRUE 19. TRUE 20. FALSE 21. TRUE 22. TRUE 23. FALSE 24. TRUE 25. TRUE 26. TRUE 27. TRUE 28. FALSE 29. TRUE


30. FALSE 31. TRUE 32. FALSE 33. FALSE 34. TRUE 35. TRUE 36. C 37. A 38. A 39. B 40. D 41. A 42. B 43. D 44. D 45. D 46. D 47. B 48. B 49. B 50. A 51. B 52. C 53. B 54. A 55. B 56. A 57. A 58. B 59. A 60. A 61. B 62. C 63. C


64. C 65. C 66. B 67. D 68. B 69. C 70. B 71. A 72. C 73. A 74. D 75. Enterprise 76. Product lifecycle management (PLM) or Product lifecycle management or PLM 77. Throughput time 78. push 79. pull 80. clusters or cells 81. available, capable or capable, available 82. activity-based costing (ABC) or activity-based costing or ABC 83. Lifecycle costs 84. value chain 85. computer-aided design/computer-aided engineering (CAD/CAE) or computer-aided design/computer-aided engineering or CAD/CAE 86. master production schedule (MPS) or master production schedule or MPS 87. Materials requirements planning (mrp) or Materials requirements planning or mrp 88. Global inventory management 89. capacity requirements planning (CRP) or capacity requirements planning or CRP 90. Manufacturing orders (MOs) or Manufacturing orders or MOs 91. Manufacturing resource planning (MRP) or Manufacturing resource planning or MRP 92. Just-in-time (JIT) or Just-in-time or JIT 93. flexible manufacturing system (FMS) or flexible manufacturing system or FMS 94. Computer-aided manufacturing (CAM) or Computer-aided manufacturing or CAM 95. Computer-aided process planning (CAPP) or Computer-aided process planning or CAPP 96. automated guided vehicle system (AGVS) or automated guided vehicle system or AGVS 97. automated storage and retrieval system (AS/RS) or automated storage and retrieval system or AS/RS


98. Move tickets 99. bill of material (BOM) or bill of material or BOM 100. exploding the bill of materials (BOM) or exploding the BOM or exploding the bill of materials 101. time-phased order 102. shop floor control (SFC) or shop floor control or SFC 103. routing master 104. periodic physical inventory counts 105. Available to promise planning 106. Capable to promise planning 107. Variance analysis 108. Final move ticket 109. Radio frequency identification (RFID) or Radio frequency identification or RFID 110. raw materials (RM) requisition or raw materials requisition or RM requisition 111. total quality control (TQC) or total quality control or TQC 112. work center master 113. workstation 114. work center

115.


116. 117. A. B. C. D. E.

Inventory process (9) Compute RM quantity variance (4) GL standard costs applied update (8) DL variances report (5) Employee/payroll master data (6)

118. 1. 2. 3. 4. 5.

B E G H J

F. G. H. I. J.

6. 7. 8. 9. 10.

Close manufacturing orders (2) Production work centers (10) Compute MOH variances (3) General ledger process (7) Budgets master data (1)

A I D C F


Chapter 16--The General Ledger and Business Reporting (GL/BR) Process Student: 1. The GL/BR process is an interacting structure of people, equipment, activities, and controls that is designed to accomplish both operations and information system functions with the purpose of generating accounting and other reports. True False

2. The business reporting process comprises accumulating, classifying, and recording data, fueling the financial reporting, business reporting, and other reporting subsystems. True False

3. The general ledger process is concerned with preparing external financial statements, ensuring they conform to GAAP, generating Web-based forms of key financial statement and related business reporting via the Internet, and supporting the generation of both ad hoc and predetermined business reports. True False

4. A feeder process is any business process that accumulates business event data that are then communicated to and processed within the GL. True False

5. The managerial reporting officer is responsible for reporting GAAP financial statements. True False

6. The financial reporting officer is primarily responsible for budgeting. True False

7. The controller notifies the business reporting process of investing and financing transaction activities, True False


8. The financial statements contain detailed information of all of an organization's business event data. True False

9. A performance report compares actual results with budgeted expectations. True False

10. Performance reports are often part of a managerial reporting system known as a responsibility accounting/reporting system. True False

11. A journal voucher is an internal source document used to notify the GL to make an accounting entry. True False

12. The general ledger master data contains summarized information of all of an organization's business event data. True False

13. The source code field of each GL entry provides a beginning point of reference for developing a proper chart of accounts. True False

14. Balanced scorecard is methodology for assessing an organization's business performance via four components: (1) financial, (2) external business process, (3) vendors, and (4) innovation and improvement activities. True False

15. Business intelligence is the integration of statistical and analytical tools with decision support technologies to facilitate complex analyses of data warehouses by managers and decision makers. True False


16. XBRL is an XML-based language consisting of a set of tags that are used to unify the presentation of business reporting information into a single format that can be easily read by almost any software package and can be easily searched by Web browsers. True False

17. XML is a generalized system for the customized tagging of data to enable the definition, transmission, and interpretation of data over the Internet. True False

18. The intent of the Sarbanes-Oxley Act of 2002 is to protect the company by improving the accuracy and reliability of all corporate disclosures made pursuant to the securities laws. True False

19. The driving force in constructing a chart of accounts is to add structure to the classification of financial information. True False

20. As we move toward an enterprise system environment, the chart of accounts becomes increasingly more important. True False

21. When implementing an ERP system, it is best to provide all users with access to all menu systems, so they can see what is going on within the system. True False

22. The general ledger process comprises accumulating, classifying, and recording data, fueling the financial reporting, business reporting, and other reporting subsystems. True False

23. The business reporting process is concerned with preparing external financial statements, ensuring they conform to GAAP, generating Web-based forms of key financial statement and related business reporting via the Internet, and supporting the generation of both ad hoc and predetermined business reports. True False


24. The financial reporting officer is responsible for reporting GAAP financial statements. True False

25. The managerial reporting officer is responsible for preparing performance reports. True False

26. The treasurer notifies the business reporting process of investing and financing transaction activities. True False

27. The source code field of each GL entry provides a beginning point of reference for developing a proper audit trail. True False

28. Balanced scorecard is methodology for assessing an organization's business performance via four components: (1) financial, (2) internal business process, (3) customers, and (4) innovation and improvement activities. True False

29. XML is an XBRL-based language consisting of a set of tags that are used to unify the presentation of business reporting information into a single format that can be easily read by almost any software package and can be easily searched by Web browsers. True False

30. The financial reporting officer typically prepares performance reports. True False

31. The financial reporting system is also known as the responsibility accounting/reporting system. True False

32. A limitation of the general ledger approach is that financial and non-financial information is combined and business event source data is retained. True False


33. An instance document is an XBRL document that contains all information, at a given point in time, including tags, about the occurrence of an item. True False

34. Convergence implies that GAAP and IFRS standards will blend together, with differences reconciled, and ultimately we will have one set of standards that can be used world-wide. True False

35. Continuous assurance (continuous auditing) is the process by which assurance is provided through monitoring of automated controls and business events in real time or near real time. True False

36. The general ledger process comprises all of the following except: A. providing information for financial reporting B. servicing the needs of managerial reporting C. classifying data by general ledger accounts D. ensuring that the external financial statements conform to GAAP

37. The business reporting process comprises all of the following except: A. preparing general purpose external financial statements B. generating ad hoc and predetermined business reports for management C. ensuring that the external financial statements adhere to GAAP D. fueling the financial reporting, business reporting, and other reporting subsystems by providing the information needed to prepare external and internal reports

38. In contrast to the managerial reporting process, the financial reporting process prepares all of the following financial statements except: A. the balance sheet B. the income statement C. the standard costing variance report D. the statement of owner equity


39. Typically, you would expect general ledger updates for financing and investing activities to be fed to the GL/BR process by: A. the controller B. the treasurer C. the chief executive officer (CEO) D. one of the AIS feeder systems

40. Typically, you would expect general ledger updates for periodic adjusting entries to be fed to the GL/BR process by: A. the controller B. the treasurer C. the chief executive officer (CEO) D. one of the AIS feeder systems

41. Which of the following individuals should possess the greatest knowledge of GAAP? A. managerial reporting officer B. budgeting department manager C. financial reporting officer D. managerial reporting officer

42. Which of the following usually would be responsible for preparing operating center budgets? A. managerial reporting officer B. budgeting department manager C. financial reporting officer D. operating line managers

43. Which of the following usually would be responsible for preparing operating center performance reports? A. managerial reporting officer B. budgeting department manager C. financial reporting officer D. operating line managers

44. Normally, you would expect that business event updates would be sent to the GL/BR process by: A. the controller B. the treasurer C. the vice president of finance D. various feeder processes


45. Performance reports to various cost center, profit center, and investment center managers are usually sent by? A. the controller B. the treasurer C. the managerial reporting officer D. the budgeting department

46. GAAP based financial statements are sent by: A. the controller B. the treasurer C. the financial reporting officer D. the managerial reporting officer

47. A responsibility accounting/reporting system includes the following: A. upward reporting of information B. aggregation of data as it flows upward C. appropriate information detail for each decision maker D. All of the above

48. Adjusted trial balance figures are usually sent from the business reporting department to the: A. the financial reporting officer B. the managerial reporting officer C. the treasurer D. the budgeting department

49. Which of the following has responsibilities and expertise to preparing internal reports? A. the financial reporting officer B. the managerial reporting officer C. the treasurer D. the budgeting department

50. Finalized budget figures are sent to the GL/BR process by: A. the financial reporting officer B. the budgeting department C. the treasurer D. the managerial reporting officer


51. Which of the following advises and assists the cost center, profit center, and investment center managers in preparing the budget? A. the financial reporting officer B. the budgeting department C. the treasurer D. the managerial reporting officer

52. Which of the following could be a journal voucher? A. general ledger cash disbursements update B. customer invoice C. receiving report D. purchase requisition

53. Which of the following statements related to journal vouchers is false for most ERP systems? A. The person completing the adjustment will enter it directly into the computer. B. The voucher will be electronic. C. Journal voucher should be signed by the person(s) authorized to initiate the entry. D. To provide an adequate audit trail, a printed copy of journal vouchers is required.

54. Which of the following provides data to the GL/BR process? A. the order entry/sales process B. the billing/accounts receivable/cash receipts process C. the purchasing/accounts payable/cash disbursements process D. All of the above

55. Inputs to a GL/BR process typically include all of the following except: A. adjusting entry journal voucher B. adjusted trial balance C. finalized budget D. GAAP-based financial statements

56. Limitations of the general ledger approach include the following: A. combining of financial and non-financial information B. elimination of source data C. use of a chart of accounts D. inability to conform to IFRS


57. The general ledger master data does not contain: A. adjusting entry data B. customer number C. business event transaction D. source code field

58. Tracing back to individual business events that have been aggregated into account balances is done by means of a(n): A. electronic reference service B. general ledger account C. audit trail D. data dictionary

59. The coding system typically used in the general ledger chart of accounts is: A. serial coding B. hierarchical coding C. block coding D. mnemonic coding

60. An account in the chart of accounts has the number 7111. Which of the following does the 7 likely represent? A. Revenues B. sales region C. merchandise sales D. golf merchandise sales

61. Which of the following items is not one of the four components of the balanced scoreboard methodology? A. Customers B. Financial C. competitive environment D. internal business processes

62. Which of the following statements related to XBRL is false? A. is an XML-based language consisting of a set of tags that are used to unify the presentation of business reporting information into a single format B. it is easily read by almost any software package, and easily searched by Web browsers C. it provides an identifying tag for each individual item of data that is computer readable D. it treats financial information as a block of text


63. The intent of the Sarbanes-Oxley Act of 2002 is to: A. protect investors by improving the accuracy and reliability of corporate disclosures B. establish who is responsible for financial reporting C. strengthen internal control D. All of the above

64. Sarbanes-Oxley Act of 2002 may lead to: A. convergence of GAAP and IFRS B. continuous or real-time reporting C. Worldwide acceptance of XBRL D. obscuring of the economic reality of business events

65. Which of the following represent a typical coding scheme for a general ledger account? A. 1XXX assets X1XX current assets XX1X cash accounts XXX3 cash in bank B. 1XXX cash in bank X1XX cash accounts XX1X current assets XXX3 assets C. 1XXX non-current assets X1XX current assets XX1X cash accounts XXX3 cash in bank D. none of the above are correct

66. Which of the following items is a component of the balanced scoreboard methodology? A. Customers B. Financial C. innovation and improvement D. All of the above

67. An instance document: A. is an XBRL document that contains all information, at a given point in time, including tags, about the occurrence of an item B. is a feature of a relational database C. is used to comply with SOX Section 409 regarding rapid disclosure of material changes D. summarizes instances of GAAP and IFRS reporting differences


68. GAAP and IFRS convergence will lead to: A. the end of the FASB B. the blending of GAAP and IFRS standards C. decreased role for the AICPA D. less costly processes for financial reporting

69. Continuous assurance (continuous auditing) will lead to: A. fewer financial statement audits B. use of audit modules embedded in ERP systems C. convergence of GAAP and IFRS D. All of the above

70. To be effectives business intelligence requires: A. a balanced scorecard B. XBRL C. integration of statistical and analytical tools with decision support technologies D. convergence of GAAP and IFRS

71. The process is an interacting structure of people, equipment, activities, and controls that is designed to accomplish both operations and information system functions with the purpose of generating accounting and other reports.

72. The process comprises accumulating, classifying, and recording data, fueling the financial reporting, business reporting, and other reporting subsystems.

73. The process comprises preparing external financial statements, ensuring they conform to GAAP, generating Web-based forms of key financial statement and related business reporting information via the Internet, and supporting the generation of both ad hoc and predetermined business reports.

74. A(n) process is any business process that accumulates business event data that are then communicated to and processed within the GL.


75. The principles.

officer possesses expertise in generally accepted accounting

76. The reports.

officer possesses expertise in preparing internal management

77. The and financing transaction activities,

notifies the general ledger/business reporting process of investing

78. The

is a list of all the accounts in the general ledger.

79. A(n)

report compares actual results with budgeted expectations.

80. Often, performance reports are part of a managerial reporting system known as a(n) system.

81. A(n) to make an accounting entry.

is an internal source document used to notify the general ledger

82. The business event data.

data contains summarized information of all an organization's

83. The source code field of each GL entry provides a beginning point of reference for developing a proper .


84. Consider the GL account number "1132" where each successive digit is subordinate to the digit to its left (e.g., 2 = cash in the bank and 3 = cash accounts). This scheme is known as coding.

85. is methodology for assessing an organization's business performance via four components: (1) financial, (2) internal business process, (3) customers, and (4) innovation and improvement activities.

86. is the integration of statistical and analytical tools with decision support technologies to facilitate complex analyses of data warehouses by managers and decision makers.

87. is an XML-based language consisting of a set of tags that are used to unify the presentation of business reporting information into a single format, easily read by almost any software package, and easily searched by Web browsers.

88. is a generalized system for the customized tagging of data to enable the definition, transmission, and interpretation of data over the Internet. It uses predefined tags to let information providers create uniform information for users.

89. The intent of the is to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws, and for other purposes.

90. Sarbanes-Oxley, Section 409 states that companies ''shall disclose to the public on a(n) and basis such additional information concerning material changes in the financial condition or operations of the issuer. .. ''

91. Sarbanes-Oxley Section 401 covers

in financial reports.


92. is the process by which assurance is provided through monitoring of automated controls and business events in real-time or near real time.

93. Changing account numbers and account structure can raise a significant information use problem called .

94. The XBRL framework is based on the concept of a(n) definitions that together provide meaning to reporting concepts.

, a group of

95. A(n) is an XBRL document that contains all information, at a given point in time, including tags, about the occurrence of an item.

96. Sarbanes-Oxley Section 302 states that the and of an organization must certify that the statements neither contain material untrue facts nor omit material facts.

97. In the balanced scorecard methodology the component focuses on more traditional measures of business performance related to how shareholders view the organization's performance.

98. In the balanced scorecard methodology the component relates to the organization's ability to identify its core competencies and to assess how well it performs in these identified areas of competency.

99. In the balanced scorecard methodology the component focuses on identifying how customers perceive the organization in terms of the value that it is creating for them.


100. In the balanced scorecard methodology the component monitors and assesses how the organization is continuing to improve and how it is creating additional value.

101. implies that Generally Accepted Accounting Principles (GAAP) and International financial Reporting Standards (IFRS) will blend together, with differences reconciled, and ultimately we will have one set of standards that can be used worldwide.

102. The is a standard-setting body, located in London, with the objective of developing globally accepted international financial reporting standards (IFRS).


103. TB Figure 16.1 is a Level 0 DFD for the general ledger and financial reporting (GL/BR) process. Required: Explode bubble 3.0, for the "Record Adjustments" process into a level 1DFD


104. TB Figure 16.3 is a Level 0 DFD for the GL/BR process. Required: Explode bubble 4.0, for the "Prepare Business Reports" process into a level 1DFD

105. Discuss the following components of the balanced scorecard: (1) (2) (3) (4)

financial internal business processes customers innovation and improvement activities


106. The important information services functions of the general ledger and business reporting (GL/BR) process emphasized in chapter 16 included two categories: (1) general ledger activities and (2) other business reporting. Briefly discuss what the general ledger (GL) process comprises and what comprises the business reporting process.

107. Chapter 16 includes a discussion The Sarbanes Oxley Act of 2002. Describe the three sections of Sarbanes Oxley that were discussed, and how these may impact financial reporting.


Chapter 16--The General Ledger and Business Reporting (GL/BR) Process Key

1. TRUE 2. FALSE 3. FALSE 4. TRUE 5. FALSE 6. FALSE 7. FALSE 8. FALSE 9. TRUE 10. TRUE 11. TRUE 12. TRUE 13. FALSE 14. FALSE 15. TRUE 16. TRUE 17. TRUE 18. FALSE 19. TRUE 20. FALSE 21. FALSE 22. TRUE 23. TRUE 24. TRUE 25. TRUE 26. TRUE 27. TRUE 28. TRUE


29. FALSE 30. FALSE 31. FALSE 32. TRUE 33. TRUE 34. TRUE 35. TRUE 36. D 37. D 38. C 39. B 40. A 41. C 42. D 43. A 44. D 45. C 46. C 47. D 48. A 49. B 50. B 51. B 52. A 53. D 54. D 55. D 56. B 57. B 58. C 59. B 60. A 61. C 62. D


63. D 64. B 65. A 66. D 67. A 68. B 69. B 70. C 71. general ledger and business reporting (GL/BR) or general ledger and business reporting or GL/BR 72. general ledger 73. business reporting 74. feeder 75. financial reporting 76. managerial reporting 77. treasurer 78. chart of accounts 79. performance 80. responsibility accounting/reporting 81. journal voucher 82. general ledger master 83. audit trail 84. hierarchical 85. Balanced scorecard 86. Business intelligence 87. eXtensible Business Reporting Language (XBRL) or eXtensible Business Reporting Language or XBRL 88. XML 89. Sarbanes-Oxley (SOX) Act or Sarbanes-Oxley Act or SOX 90. rapid, current or current, rapid 91. disclosures 92. Continuous assurance (continuous auditing) or Continuous assurance or Continuous auditing 93. comparability 94. taxonomy 95. instance or instance document 96. CEO, CFO or CFO, CEO


97. financial 98. internal business processes 99. customers 100. innovation and improvement activities 101. Convergence 102. International Accounting Standards Board (IASB) or International Accounting Standards Board or IASB 103.


104. 105. Balanced scorecard is a methodology for assessing an organizations business performance via four components: (1) financial, (2) internal business processes, (3) customers, and (4) innovation and improvement activities. The financial aspect focuses on more traditional measures of business performance related to how shareholders view the organizations performance. The internal business processes relate to the organizations ability to identify its core competencies and to assess how well it performs in these identified areas of competency. The customer component focuses on identifying how customers perceive the organization in terms of the value that it is creating for them. Innovation and improvement activities are monitored to assess how the organization is continuing to improve and how it is creating additional value. 106. The general ledger process comprises accumulating data, classifying data by general ledger accounts, and recording data in those accounts. Fueling the financial reporting, business reporting, and other reporting subsystems by providing the information needed to prepare external and internal reports. In servicing the information needs of managerial reporting, the GL interacts with the budgeting modules. The business reporting process is concerned with the following: Preparing general purpose, external financial statements (e.g., the conventional four that you have studied in other accounting courses: the balance sheet, income statement, statement of owner equity changes, and cash flow statement). Ensuring that the external financial statements conform to GAAP; therefore, among other things, the statements must contain appropriate footnote disclosures. Generating Web-based forms of key financial statement and related business reporting information for dissemination via the Internet. Supporting the generation of both ad hoc and predetermined business reports that support operational and strategic decision making.


107. The following are the major concepts covered with each section of Sarbanes Oxley. Section 401 - disclosures in financial reports - off balance sheet items - redefines GAAP - transparent reporting of economic effect of transactions Section 404 - reporting on internal controls - requires SEC to set rules - report must include responsibility of management - report must include attestation Section 409 - rapid and current disclosure - covers material items - speeding up reporting


Chapter 17--Acquiring and Implementing Accounting Information Systems Student: 1. An important segment of the outsourcing market is the application service provider (ASP), which hosts, manages, and provides access to hardware and software over the Internet to multiple users. True False

2. The purpose of systems selection is to develop specifications for a new or revised system. True False

3. The purpose of AIS implementation is to begin using the new system. True False

4. The primary tasks of systems operation are to conduct post-implementation review and perform systems maintenance. True False

5. The accountant as an implementer can become involved with systems survey and needs analysis tasks. True False

6. As an analyst, the accountant could be involved in change management issues and/or technical aspects of converting data, software, and hardware from the old to the new AIS. True False

7. The internal auditor may review AIS development/acquisition projects to ensure that the process has been efficient and effective and that the acquisition team has followed the organization's standard procedures for systems development/acquisition. True False


8. The external auditor may perform an independent review to assess if and how internal controls have been impacted by the AIS development/acquisition. True False

9. A problem has an economically feasible solution if it can be solved with existing software and hardware technology. True False

10. Users, managers, and auditors are required to participate in the systems development project. These people generally provide approvals, often called signoffs, at preestablished management control points. True False

11. Structured systems analysis is a set of procedures conducted to generate the specifications for a new (or modified) information system or subsystem. True False

12. Specific reports and other documentation, called process documents, must be produced periodically during systems development to make development personnel accountable for faithful execution of systems development tasks. True False

13. Deliverables signify approval of the development process and the system being developed. True False

14. The logical specification, physical requirements, and budget and schedule are all part of the systems analysis deliverable called an approved systems analysis document. True False

15. Similar to the developer of an industrial park, an organization's management or IT steering committee approves a systems development project for further systems development. True False


16. The analysis team conducts a cost/effectiveness study, which provides quantitative and certain qualitative information concerning each of the system alternatives. True False

17. The cost/benefit study attempts to answer the questions, "which alternative accomplishes the user's goals for the least cost (or greatest benefit)?" and "which alternative best accomplishes a user's goals for the system being developed?" True False

18. The cost/effectiveness study attempts to answer the questions, "which alternative accomplishes the user's goals for the least cost (or greatest benefit)?" and "which alternative best accomplishes the user's goals for the system being developed?" True False

19. An indirect cost is one that is directly attributable to the system or the system. True False

20. A tangible cost is one that can be reasonably quantified, such as software purchase and insurance. True False

21. An intangible cost is one that cannot be reasonably quantified, such as productivity losses caused by low employee morale. True False

22. A direct cost is one that is directly attributable to the system or the system change, such as reduced overhead costs. True False

23. Indirect benefits are not directly attributable to the system or the system change. True False


24. Tangible benefits are those that can be reasonably quantified, such as reduced equipment costs and increased revenues. True False

25. Intangible benefits are those that cannot be reasonably quantified, such as those that result from having improved information. True False

26. The first analysis deliverable, the logical specification, is used in systems selection to choose the appropriate software to be acquired from external sources. True False

27. The second analysis deliverable, the physical requirements are used in systems selection to acquire computer equipment for the new system. True False

28. Systems design is a set of procedures performed to choose the software specifications and hardware resources for an information system. True False

29. As depicted in the text, the approved configuration plan is the final output of the software and hardware study. True False

30. A service bureau is a firm providing information processing services, including hardware and software, for a fee. True False

31. Outsourcing is a term that describes an organization's assigning any of its internal functions (e.g., accounting, legal, or IT) to an outside vendor. True False


32. An RFP is a document sent to vendors that invites submissions of plans for providing hardware, software, and related services. True False

33. To validate vendor proposals for supplying computer hardware, an organization will assess both a system's specifications and performance. True False

34. A benchmark is a representative workload, processed on each vendor's proposed system configuration, to obtain comparative throughput measures. True False

35. As data from the existing system are mapped into the new system, exception-reporting situations must be devised to ensure that the data are converted accurately. True False

36. The design of interfaces involves how data from the existing system are mapped into the new system. True False

37. Structured systems design is a set of procedures performed to convert the logical specification into a design that can be implemented on the organization's computer system. True False

38. The approved systems design document documents the system design and summarizes the implementation training and test plans. True False

39. The approved systems design document is used by programmers, the personnel department, and information systems personnel. True False


40. Systems developed using structured systems design techniques are more costly over the life of the system because maintenance of such structured systems is problematic. True False

41. Systems operation includes the post-implementation review. True False

42. Systems maintenance is a set of procedures performed to complete the design contained in the approved systems design document and to test, install, and begin to use the new/revised information system. True False

43. In the parallel approach to systems implementation, both the new and old systems operate together for a period of time. True False

44. Of the three approaches to systems implementation presented in the text, the parallel approach is the riskiest. True False

45. With the modular approach to systems implementation, the new system either is implemented one subsystem at a time or is introduced into one organizational unit at a time. True False

46. Enterprise systems are often implemented using the direct approach. True False

47. The direct approach is also known as the "big bang" or "cold turkey" approach. True False

48. The modular approach forces the users to learn the new system because they do not have the old system to fall back on. True False


49. The modular approach is also referred to as the phased approach. True False

50. As an analyst, the accountant could be the development team member who conducts a preliminary survey. True False

51. As an internal auditor the accountant could be called in to complete the design, help prepare the contracts, or help plan, conduct, and evaluate the system tests. True False

52. As a user, the accountant might initiate the AIS acquisition. True False

53. After the conversion is completed, the systems development project team writes the project completion report. True False

54. Conversion to new computer programs must be undertaken using contingency plans to ensure that only authorized, tested, and approved versions of the programs are promoted to production status. True False

55. The user, the programmer, and another member of the programming team do a walkthrough of the module specifications and the test plan to determine that the test plan is adequate; then the programmer codes the program. True False

56. The removal of program errors is called debugging. True False

57. Making program changes, correcting errors in the programs, and adding enhancements to the programs is called systems development. True False


58. The systems development life cycle (SDLC) methodology is an informal, ad-hoc, set of activities used to manage a systems development project. True False

59. The acceptance test is a user-directed test of the complete system in a test environment. True False

60. Software as a Service (SaaS) is a Web-based model for software distribution where multiple users may simultaneously use the software. True False

61. The post-implementation review is an examination of a working system, conducted soon after the system's implementation. True False

62. Systems maintenance is the modification of existing applications. True False

63. Perfective maintenance is performed to fix errors. True False

64. Corrective maintenance is conducted to improve the performance of an application. True False

65. Adaptive maintenance adjusts applications to reflect changing business needs and environmental challenges. True False

66. The Sarbanes-Oxley Act prohibits CPA firms from serving as system consultants. True False


67. Which of the following is the assignment of an internal function to an outside vendor? A. outsourcing B. application service provider C. Insourcing D. Benchmarking

68. Which of the following hosts, manages, and provides access to software and hardware over the Internet to multiple customers? A. Outsourcing B. application service provider C. Insourcing D. Benchmarking

69. Which of the following functions cannot be outsourced? A. Accounting B. Legal C. IT D. all of these functions can be outsourced

70. Which of the following has the task of evaluating alternative AIS solutions? A. AIS analysis B. AIS selection C. AIS implementation D. AIS operations

71. Which development phase has the purpose of developing specifications for the new or revised system? A. analysis B. design C. implementation D. operation

72. Which development phase has the task of post-implementation review? A. analysis B. design C. implementation D. operation


73. Which of the following includes activities for the successful switch from the old to the new AIS? A. analysis B. design C. implementation D. operation

74. Which of the accountant roles involves contributing to systems survey and needs analysis? A. programmer B. analyst C. purchaser D. implementer

75. Which role in the AIS Development/Acquisition process requires the accountant to be equally adept at dealing with people, accounting, and technology? A. User B. analyst C. purchaser D. implementer

76. In which role might the accountant be the person who initiates the AIS acquisition cycle, and is in a prime position to recognize deficiencies and incompatibilities related to the existing AIS? A. User B. analyst C. purchaser D. implementer

77. In which role might the accountant help meet the organization's AIS needs by selecting the final system for purchase? A. consultant B. internal auditor C. external auditor D. none of the above

78. Outputs of the systems analysis phase of development typically would include all of the following except: A. requests for proposal (RFPs) for software/hardware acquisition B. the logical specifications for the selected system design alternative C. the physical requirements for the selected system design alternative D. a budget for the systems design and systems implementation phases of development


79. The system development step that immediately precedes the structured system design step is: A. structured systems analysis B. systems implementation and operations C. systems survey D. systems selection

80. Which of the following is a deliverable from the structured systems analysis step of systems development? A. selected hardware and software B. logical specification C. approved configuration D. project completion report

81. Which of the following is not a task required to complete structured systems analysis? A. develop the physical requirements for the selected design B. develop the budget for the next two system development phases C. develop logical specifications for the selected design D. develop the system survey

82. Determination of user requirements in the analysis step of systems development is more difficult in an e-business implementation because: A. user requirements inside and outside the organization must be determined B. users are more resistant to change to an e-business implementation C. e-business software is inherently more complex D. users fear e-business implementations will negatively impact their jobs

83. Which of the following would be the likely trigger for the structured systems analysis step of systems development? A. a request for proposal (RFP) B. the logical specifications C. an approved feasibility document D. the physical requirements

84. Software as a Service (SaaS) may include: A. video hosting and streaming B. word processing C. e-mail D. all of the above


85. In structured systems analysis, the analysis preferably should start with analysis and documentation of: A. the current physical system B. the current logical system C. the future logical system D. the future physical system

86. After the analysis team studies and documents the current physical system they should next: A. study and document the current logical system B. define user requirements for the new/modified system C. design alternative future physical systems D. determine the cost of the new/modified system

87. The following is a jumbled list of the four steps in structured systems analysis that were presented in the text:

I. II. III. IV.

Define the future logical system. Document the current logical system. Study the current physical system. Design the future physical system.

Which of the following is the logically correct sequence of steps?

A. II, IV, I, III B. III, II, I, IV C. III, II, IV, I D. II, I, III, IV 88. After defining the requirements for the new system, the current logical DFD should be modified to reflect the components of the future system. The development team may propose logical design alternatives for the future logical system that may involve derivatives of the following except: A. internal entities B. Activities C. data stores D. control activities

89. Which of the following ranks each alternative on its relative capability to satisfy the user's requirements (goals) for the system? A. the cost/effectiveness study B. the cost/benefits analysis C. the effectiveness analysis D. the intangible benefits analysis


90. The cost of computer hardware to be purchased for a new system is an example of a(n) system. A. direct cost B. indirect cost C. intangible cost D. recurring cost

91. Personnel fringe benefits are an example of a(n) A. direct cost B. indirect cost C. intangible cost D. nonrecurring cost

cost.

92. Which of the following benefits can be reasonably quantified? A. direct benefits B. tangible benefits C. indirect benefits D. intangible benefits

93. Insurance on a computer installation is an example of a(n) A. tangible B. intangible C. indeterminate D. variable

cost.

94. Productivity losses caused by reduced employee morale are an example of a(n) A. direct cost B. indirect cost C. intangible cost D. nonrecurring cost

95. Which of the following is a cost that cannot be reasonably quantified? A. nonrecurring cost B. recurring cost C. tangible cost D. intangible cost

cost.

cost for that


96. Reduced salaries and wages that will result from a systems change are an example of a(n) A. direct B. indirect C. intangible D. nonrecurring

benefit.

97. Following a systems development methodology during systems development: A. is more costly in the long run than not following such a methodology B. should ensure that development efforts are efficient and consistently lead to information systems that meet organizational needs C. applies only to in-house systems development D. increases user resistance to the new or modified system

98. The physical requirements of a proposed system would include all of the following except: A. functional layouts for computer inquiry screens and reports B. user requirements C. response times D. workload and volume

99. Structured systems design in the systems development process is analogous to which of the following tasks required in constructing an industrial park? A. finalizing blueprints and other construction-related plans B. choosing the construction contractors C. the architect's determining each building's specific use, required room sizes, electrical and plumbing requirements, etc. D. estimating the construction costs and preparing the forecasted construction schedule

100. The systems selection tasks include all of the following except: A. determine what computer software design will implement the logical specification developed in structured systems analysis B. determine what computer hardware will satisfy the physical requirements established in structured systems analysis C. determine miscellaneous environmental needs D. determine appropriate acquisition ancillaries


101. Which of the following is not specified in the approved configuration plan? A. chosen software configuration and expected performance specifications B. results of testing alternative software design and hardware resources C. assessment of financing and outsourcing activities D. appropriate acquisition ancillaries

102. Which of the following triggers the systems selection process? A. logical specification B. physical requirements C. both a and b D. neither a nor b

103. Which of the following is a characteristic of internal hardware sources? A. costs are mainly fixed B. management and staff are provided C. additional capacity may be available D. costs are mostly variable

104. Which of the following is a characteristic of external hardware sources? A. costs are mainly fixed B. management and staff are provided C. capacity is limited D. can determine the level of control, security and privacy

105. Which of the following issues is not a task of systems selection? A. determine what software design will implement the logical specification B. choose acquisition financing methods C. determine appropriate acquisition ancillaries D. develop an implementation plan

106. An organization might request bids for computer resources from only one vendor for all of the following reasons except: A. to reduce training cost by staying with its present vendor B. to satisfy a specialized need C. to improve its bargaining position by maintaining a competitive selection posture D. to minimize conversion cost by staying with its present vendor


107. Which of the following statement regarding use of a service bureau is false? A. a service bureau provides information processing services B. a service bureau is more expensive than using an in-house computer C. a service bureau can provide both hardware and software for a fee D. a service bureau contract generally includes company involvement with the system.

108. Which of the following statements regarding software acquisition (purchase vs. in-house development) is false? A. software developed in house can cost 10 times more than purchased software B. when a suitable software package is available for purchase, it is better to buy it rather than try to reinvent it in-house C. the annual maintenance of in-house software is typically 25% of the development cost, whereas the annual maintenance of purchased software is typically 50% of the purchase price D. none of the statements are false

109. The process of evaluating the vendor proposals includes all of the following except: A. determine to which vendors the RFPs will be sent B. validate vendor proposals C. consider other data and criteria D. suggest resources

110. The goal of validating vendor proposals is to determine: A. which vendor has the equipment that is easiest to use B. which vendor proposal costs the least C. which proposed systems meet the organization's requirements D. which vendor proposal should be selected

111. A representative workload, processed on a vendor's proposed system configuration, to obtain comparative throughput measures is called a(n): A. benchmark B. RFP test C. time trial D. systems analysis test


112. The number of sales transactions that can be entered within a specified period of time is a measure of the computer system's: A. throughput B. computing capacity C. outsource production D. performance ratio

113. A detailed vendor comparison would normally include all of the following except: A. documentation volume B. cost of typical configuration C. maximum number of workstations D. benchmark results

114. Typically, all of the following are tasks of structured systems design except: A. to recommend which computer hardware to use for the new system B. to convert the structured specification into a reliable, maintainable design C. to develop a plan and budget that will ensure an orderly and controlled implementation of the new system D. to develop a user manual which facilitates efficient and effective use of the new system

115. Which of the following statements regarding SDLC methodology is false? A. Following this type of methodology should ensure that development efforts are efficient and consistently lead to information systems that meet organizational needs. B. These guidelines are appropriate only when an organization is going to acquire an AIS, not when they plan to develop it in-house. C. Users, manages, and auditors provide approvals called signoffs. D. Specific reports and other documentation, called deliverables, must be produced periodically during systems development.

116. To write computer programs and interfaces, programmers use: A. the approved systems design document B. the approved systems analysis document C. the approved feasibility document D. the approved configuration plan

117. As presented in this text, systems operation comprises two steps¾namely, A. systems implementation, systems maintenance B. systems maintenance, post-implementation review C. systems implementation, post-implementation review D. systems design, systems implementation

and

.


118. A building inspection shortly after completing the construction of an industrial park is analogous to the step in the systems development process. A. systems implementation B. systems maintenance C. post-implementation review D. systems operation

119. Making repairs and modifications to the system is known as: A. systems implementation B. systems maintenance C. post-implementation review D. systems operation

120. Checking to see if the new system is doing what it is supposed to do is part of: A. systems implementation B. systems maintenance C. post-implementation review D. systems operation

121. Which of the following is not a task of systems implementation? A. complete the design contained in the approved systems design document B. write, test, and document the programs and procedures required by the approved systems design document C. complete the preparation of user manuals D. determine, by thoroughly testing the system with programmers, that the system satisfies the programmer's requirements

122. Which of the following statements related to implementation approaches is false? A. The parallel approach provides a high level of control. B. In very large implementations, such as enterprise systems, it is often best to take the parallel approach. C. The modular approach can be combined with either of the other two approaches. D. The direct approach is the riskiest of the three approaches.

123. Which of the following statements related to implementation approaches is true? A. The parallel system significantly decreases employee's work load during the conversion period. B. The parallel system terminates the operation of the old system and then compares the outputs of the two systems C. The modular approach can only be combined with the direct approach. D. The direct approach is the riskiest of the three approaches


124. If a new payroll system is installed for the employees of plant 1 at time A, followed by plant 2 at time B, and finally plant 3 at time C, this is an example of the approach to systems implementation. A. parallel B. direct C. modular D. indirect

125. The following picture from the text illustrates the

approach to systems implementation:

A. parallel B. direct C. modular D. Indirect

126. The following picture from the text illustrates the

A. parallel B. direct C. modular D. indirect

approach to systems implementation:


127. The following picture from the text illustrates the

approach to systems implementation:

A. parallel B. direct C. modular D. indirect

128. Which of the following statements regarding the modular approach is false? A. It is also referred to as the phased approach. B. It can be combined with the parallel or the direct approach. C. It is always a faster approach than parallel. D. It can combine the safety and control of a parallel implementation with cost/time savings of the direct approach.

129. Which of the following is not typically a role for the accountant in a system's implementation? A. User B. programmer C. analyst D. consultant

130. The final step in the in the implementation process is to write: A. the approved configuration plan B. the project completion report C. the post-implementation review report D. the user manual(s)


131. A feasibility study is conducted to determine: A. if funds are available for the proposed project B. the scope of the problem C. user requirements for the proposed system D. if outsourcing might solve this problem

132. Which of the following is not a significant activity during the systems implementation phase? A. computer resource acquisition B. system maintenance C. software and hardware installation D. site preparation

133. Systems implementation is triggered by: A. the approved configuration plan B. the approved system design document C. both a and b D. neither a or b

134. The project completion report will include all of the following except: A. summary of requirements satisfied by the new system B. request for proposals C. estimated and actual duration of each development stage D. system documentation

135. A user-directed test of the complete system in a test environment is called a(n) A. Unit B. integration C. Stub D. acceptance

136. The runs a subset of the system in the actual production environment. A. unit test B. integration test C. systems test D. operations test

test.


137. Which of the following statements regarding systems maintenance is false? A. It should include analysis, cost/benefit study, design, implementation, and approvals for each development step. B. To ensure that all necessary maintenance requests are submitted, users should never be charged for maintenance costs. C. A formal procedure for submitting change requests should be adopted. D. High-quality documentation must be created and maintained.

138. Which of the following is conducted as a follow up to a system's recent implementation? A. a post-implementation review B. systems maintenance C. a systems survey D. Troubleshooting

139. All of the following would be tasks of post-implementation review except: A. ensure a correct conversion by planning, controlling, and conducting an orderly installation of the new system B. determine if the user is satisfied with the new system C. identify how well the system's performance corresponds to the performance requirements D. evaluate the quality of the new system's documentation

140. The type of maintenance that is conducted to improve the performance of an application is referred to as: A. preventive B. perfective C. adaptive D. corrective

141. The type of maintenance that is conducted to fix errors of an application is referred to as: A. preventive B. perfective C. adaptive D. corrective

142. The type of maintenance that is conducted to adjust applications for changing business needs and environmental challenges of an application is referred to as: A. preventive B. perfective C. adaptive D. corrective


143.

is the assignment of an internal function to an outside vendor.

144. A(n) offers a traditional outsourcing mechanism whereby it hosts, manages, and provides access to application software and hardware over the Internet to multiple customers.

145. The purpose of the phase of the Information System Development process is to develop specifications for a new or revised system.

146. may simultaneously use the software.

147. One task of the

148. Tasks of the perform systems maintenance.

149. As a(n) AIS acquisition phases.

is a Web-based model of software distribution where multiple users

phase is to convert to the new or revised system.

phase are to conduct post-implementation review and to

, the accountant can become involved with any or all of the

150. In particular, intricate knowledge of accounting and information technology helps the accountant be successful in the role of .


151. As agents of management and the board of directors, ensure that the acquisition team has followed the organization's standard procedures for systems acquisition and that the process has been efficient and effective.

152. have been impacted.

153. A problem has a(n) technology.

review the acquisition cycle and assess if and how internal controls

feasible solution if it can be solved with existing

154. If the payback and internal rate of return estimates are sufficient to allow the development project to proceed it is said to have feasibility.

155. reflects a set of procedures conducted to generate the specifications for a new (or modified) information system or subsystem.

156. The logical specification, physical requirements, and budget and schedule are all part of the systems analysis deliverable called a(n) .

157. Similar to the developer of an industrial park, an organization's management or IT approves a systems development project for further systems development.

158. The systems analysis team conducts a(n) and certain qualitative information concerning each of the system alternatives.

which provides quantitative


159. The analysis or study is performed before an effectiveness analysis because the data are relatively easy to obtain and are more objective than the data on effectiveness.

160. A(n) system change.

161. the system change.

162. A(n) purchase and insurance.

cost is one that is directly attributable to the system or the

costs are associate with but not directly attributable to the system or

cost is one that can be reasonably quantified, such as software

163. A(n) cost is one that cannot be reasonably quantified, such as productivity losses caused by low employee morale.

164.

are incurred only once to get the system operational.

165. A(n) benefit is one that is directly attributable to the system or the system change, such as reduced personnel costs.

166. change.

benefits are not directly attributable to the system or the system


167. benefits are those that can be reasonably quantified, such as reduced equipment costs and increased revenues.

168. benefits are those that cannot be reasonably quantified, such as those that result from having improved information.

169. Structured system design is a set of procedures performed to convert the into a design that can be implemented on the organization's computer system.

170. Defining requirements such as the amount of data to be stored, functional layouts for computer inquiry screens and reports, and processing response times are part of developing the for the selected design.

171. A(n) hardware and software for a fee.

is a firm providing information processing services, including

172. A(n) is a document sent to vendors that invite submission of plans for providing hardware, software, and services.

173. A computer system's time.

is the quantity of work performed in a period of

174. A(n) is a representative user workload, processed on each vendor's proposed system configuration, to obtain comparative throughput measures.


175. Interviews that are conducted with personnel outside the organization are called .

176. The implementation, training, and test plans.

documents the system design and summarizes the

177. Systems operation includes systems maintenance and

.

178. reflects a set of procedures performed to complete the design contained in the approved systems design document and to test, install, and begin to use the new or revised information system.

179. In the systems operate together for a period of time.

approach to systems implementation, both the new and old

180. Of the three approaches to systems implementation presented in the text, the approach is the riskiest.

181. With the approach to systems implementation, the new system either is implemented one subsystem at a time or is introduced into one organizational unit at a time.

182. When implementing to take the parallel approach.

systems, it is often capacity or cost prohibitive


183. The direct approach is also known as the approach.

or

184. The old system is not available to fall back on.

approach forces the users to learn the new system because the

185. The

approach is also referred to as the phased approach.

186. As a(n) , the accountant could be the person who initiates the AIS acquisition cycle because (s)he will be in a prime position to recognize deficiencies and incompatibilities related to the existing AIS.

187. The summarizes the implementation activities and provides documentation for operating the new system and for conducting the post-implementation review and systems maintenance.

188. The two main inputs that trigger systems implementation are the the .

and

189. The user, the programmer, and another member of the programming team do a(n) of the module specifications and the test plan to determine that the test plan is adequate; then the programmer codes the program.

190. The removal of program errors is called

.


191. Making program changes, correcting errors in the programs, and adding enhancements to the programs is called systems .

192. The

verifies the new system against the original specifications.

193. A user-directed test of the complete system in a test environment is called a(n) test.

194. The environment.

test runs a subset of the system in the actual production

195. The system's implementation.

is an examination of a working system, conducted soon after the

196.

is the modification of existing applications.

197.

maintenance is performed to fix errors.

198. application.

maintenance is conducted to improve the performance of an

199. and environmental challenges.

maintenance adjusts applications to reflect changing business needs


200. The automated procedures.

should describe operating procedures for both manual and

201. Briefly discuss application service providers (ASP) and Software as a Service (SaaS).

202. Discuss four ways that an accountant is often involved with the AIS acquisition?

203. Discuss the accountant's involvement in systems selection including: 1. 2. 3. 4.

As an analyst As consultant As a user As an internal auditor


204. Growing State University (GSU) is planning to change from its batch-oriented grade reporting system (BGRS) to a new, online grade reporting system (OGRS). The partial organization chart for GSU appears in TB Figure 17.1. TB Figure TB 17.2 is reproduced from Chapter 17 and shows three possible system implementation approaches. Required: Demonstrate your understanding of the three approaches in TB Figure 17.2 by constructing an example from the GSU scenario to explain (in one paragraph for each) how each approach might be applied at GSU. Be specific as to which of GSU's organizational units would convert to OGRS and when. Assume that time X in TB Figure 17.2 is the start of the 20X8 fall semester. Make and state any other assumptions you feel are necessary.



205. TB Figure 17.3 is taken from the text figure showing the systems selection task and documents.

Required: Explode bubble 3.0 Systems Selection into a Level 1 DFD. The DFD should include the items listed below. The data flows for available hardware and physical requirements are listed twice because these data flows will each appear twice in the Level 1 DFD. Process bubbles 3.1 Prepare requests for proposal


3.2 Evaluate vendor proposals 3.3 Assess software plan 3.4 Complete configuration plan External entities External sources Hardware/ software vendors Data flows Approved configuration plan Available hardware Available hardware Logical specification Physical requirements Physical requirements Request for proposal Software specifications Suggested hardware resources Vendor proposals


206. Figure TB 17.5 is the DFD of the systems development life cycle as presented in the text.

Required: Explode bubble 4.0 Structured Systems Design into a Level 1 DFD. All of the process bubbles and data flows are presented below. The data flows for implementation plan and budget and logical specification are listed twice because these data flows will appear twice in the Level 1 DFD. Process Bubbles 4.1 Specify modules


4.2 Develop implementation plan and budget 4.3 Develop implementation test plan 4.4 Develop user manual 4.5 Develop training program 4.6 Complete systems design document Data Flows Approved configuration plan Approved systems design document Design specifications Implementation plan and budget Implementation test plan Implementation plan and budget Logical specification Logical specification Training plan User manual


Chapter 17--Acquiring and Implementing Accounting Information Systems Key

1. TRUE 2. FALSE 3. TRUE 4. TRUE 5. FALSE 6. FALSE 7. TRUE 8. TRUE 9. FALSE 10. TRUE 11. TRUE 12. FALSE 13. FALSE 14. TRUE 15. TRUE 16. TRUE 17. FALSE 18. TRUE 19. FALSE 20. TRUE 21. TRUE 22. FALSE 23. TRUE 24. TRUE 25. TRUE 26. TRUE 27. TRUE 28. FALSE


29. FALSE 30. TRUE 31. TRUE 32. TRUE 33. TRUE 34. TRUE 35. TRUE 36. FALSE 37. TRUE 38. TRUE 39. TRUE 40. FALSE 41. TRUE 42. FALSE 43. TRUE 44. FALSE 45. TRUE 46. TRUE 47. TRUE 48. FALSE 49. TRUE 50. TRUE 51. FALSE 52. TRUE 53. TRUE 54. FALSE 55. TRUE 56. TRUE 57. FALSE 58. FALSE 59. FALSE 60. FALSE 61. TRUE 62. TRUE


63. FALSE 64. FALSE 65. TRUE 66. FALSE 67. A 68. B 69. D 70. B 71. A 72. D 73. C 74. B 75. D 76. A 77. D 78. A 79. D 80. B 81. D 82. A 83. C 84. D 85. A 86. B 87. B 88. A 89. C 90. A 91. B 92. B 93. A 94. C 95. D 96. A


97. B 98. B 99. A 100. C 101. D 102. C 103. A 104. B 105. D 106. C 107. B 108. C 109. A 110. C 111. A 112. A 113. A 114. A 115. B 116. A 117. B 118. C 119. B 120. C 121. D 122. B 123. D 124. C 125. A 126. B 127. C 128. C 129. B 130. B


131. B 132. B 133. C 134. B 135. D 136. D 137. B 138. A 139. A 140. B 141. D 142. C 143. Outsourcing 144. application service provider (ASP) or application service provider or ASP 145. analysis 146. Software as a Service (SaaS) or Software as a Service or SaaS 147. implementation 148. operation 149. consultant 150. implementer 151. internal auditors 152. External auditors 153. technically 154. economic 155. Structured systems analysis 156. approved systems analysis document 157. steering committee 158. cost/effectiveness study 159. cost/benefit 160. direct 161. Indirect 162. tangible 163. intangible 164. Nonrecurring costs


165. direct 166. Indirect 167. Tangible 168. Intangible 169. logical specification 170. physical requirements 171. service bureau 172. request for proposal (RFP) or request for proposal or RFP 173. throughput 174. benchmark 175. external interviews 176. approved systems design document 177. post-implementation review 178. Systems implementation 179. parallel 180. direct 181. modular 182. enterprise 183. big bang, cold turkey or cold turkey, big bang 184. direct 185. modular 186. user 187. project completion report 188. approved configuration plan, approved systems design document or approved systems design document, approved configuration plan 189. walkthrough 190. debugging 191. maintenance 192. system test 193. acceptance 194. operations or environmental 195. post-implementation review 196. Systems maintenance 197. Corrective 198. Perfective


199. Adaptive 200. user manual 201. An application service provider (ASP) offers a traditional outsourcing mechanism whereby it hosts, manages, and provides access to application software and hardware over the Internet to multiple customers. The fee is really a rental based on usage. Some ASPs provide service for free, obtaining revenue from advertising and the sale of other services. ASPs relieve the organization of the burden of developing or buying and installing software and hardware. Because ASPs are accessed over the Internet, a user needs only a Web browser and a basic PC or other method of accessing the Internet (such as a browser-enabled mobile phone) to obtain the ASP service. When using an ASP, a user obtains constantly updated software. The user does not need the technical resources to install or support the application. ASPs are a good choice for applications where the user does not want to purchase and maintain the application or simply wants access from any Internet access point. QuickBooks Online Edition and TurboTax, both from Intuit, Inc., are two consumer products that traditionally have been sold as "purchase and install" but are now available as an ASP service. Software as a service (SaaS) is a Web-based model of software distribution where multiple users may simultaneously use the software. SaaS provides results similar to an ASP, with some underlying differences. ASPs are generally traditional applications with Web interfaces, whereas SaaSs are typically created for the Web environment and are frequently implemented in a cloud computing setting. With an ASP, the hosting site may have application knowledge as well as hardware configured to optimize the software, whereas SaaS applications may be hosted by third parties unrelated to the software provider or developer. One of the more widely adopted examples of SaaS is Google Apps. a Google Apps' offerings include on-demand, net-based document creation and management (Docs), e-mail (Gmail), video hosting and streaming (Video), and sharing capabilities (Sites). 202. Students should discuss four of the following items: User Analyst Purchaser Implementer Consultant Internal auditor External auditor User: Whether you are a staff accountant, controller, or CFO, you will be using an AIS on a regular basis. In any of these roles, you might be a business process owner as well, which means that you will be responsible for (or own) certain data sets (such as payroll, general ledger, or customer billing data). As such, you very well could be the person who initiates the AIS acquisition cycle because you will be in prime position to recognize deficiencies and incompatibilities related to the existing AIS. Analyst: Because you will be intimately familiar with functionality and controllability aspects of accounting systems, you could be asked to participate on a systems analysis team to conduct a preliminary survey used to determine what is needed in a new AIS. Even when the accountant is not familiar with a particular business process, he or she can contribute skills in acquiring and documenting descriptions of processes. Purchaser: You could also become a member of the AIS selection team. In this capacity, you will have to match the organization's requirements with the capability of various commercially available accounting systems, evaluate a set of potential AIS solutions, and help to make the final purchase selection. Implementer: After the AIS is purchased, it is time to switch the old with the new, which is much easier said than done. You could become involved with this vitally important phase of the acquisition cycle. If so, you will have to be equally adept at dealing with people, accounting, and technology. In particular, your intimate knowledge of accounting and information technology will help you be successful in this role. Consultant: Although the Sarbanes-Oxley Act prohibits CPA firms who audit a public company to also serve as systems consultants for the same company, AIS consulting is nevertheless alive and well. Even though most CPA firms have spun off their consulting divisions into separate entities, these new consulting companies continue to need accountants. There are also many opportunities for traditional management consulting firms. Furthermore, CPA firms still consult (they often call themselves "business advisors"), just not for their audit clients. As a consultant, you can become involved with any or all of the AIS acquisition phases. Internal auditor: Because internal auditors are knowledgeable about AIS function and control requirements, they often serve as advisors or consultants during the acquisition cycle. Also, as agents of management and the board of directors, internal auditors ensure that the acquisition team has followed the organization's standard procedures for systems acquisition and that the process has been efficient and effective. External auditor: As an external auditor, you will conduct an internal control assessment. During your assessment, you will have to determine how changes in the AIS might have affected overall audit risk. As discussed in Chapter 7 of this textbook, professional guidance in this regard is found in the Statement on Auditing Standards (SAS) 94, entitled "The Effect of Information Technology on the Auditor's Consideration of Internal Control in a Financial Statement Audit." Thus, external auditors will review the acquisition cycle and assess if and how internal controls have been impacted.


203. An accountant might become involved in systems selection in a number of ways. As an analyst, the accountant could be the evaluation team member with the most expertise in internal control and possess expertise in computer applications for the AIS. As a consultant, the accountant might be called on to provide such expertise, as well as objectivity. The accountant has a great deal of knowledge in making software and hardware selections for the AIS. As a user of the system, the accountant could provide guidance on the tax and financial implications of alternative financing methods. The accountant might also be called upon to comment on the adequacy of the proposed resource choices. The accountant as an internal auditor could be a member of the evaluation team regarding auditability and controllability of the system. Also, as an internal auditor, the accountant could be responsible for reviewing and reporting on the efficiency and effectiveness of the system. 204. INSTRUCTOR NOTE: Obviously, several alternative solutions are possible and acceptable. The following solution assumes that GSU wants to isolate any conversion problems that might arise by confining them to the smallest population possible. Therefore, GSU decides to start the conversion at the lowest level in the organization chart¾namely, sections 001 through 005 of AIS. Parallel Approach: For the fall semester, 20X8, all AIS sections report grades on both the old (BGRS) and new (OGRS) systems. The output results are compared and, if satisfactory, BGRS is abandoned and OGRS is adopted for all AIS sections, effective with the spring 20X9 semester. Similar pilot projects could then be extended to higher levels in the organization in spring 20X9. Direct Approach: All sections of AIS abandon BGRS and adopt OGRS for fall 20X8, without any pilot project to compare the old and new systems in parallel operation. Modular Approach: For the fall semester, 20X8, section 001 of AIS only reports grades on both the old (BGRS) and new (OGRS) systems. Sections 002 through 005 continue to use BGRS as before. The output results for section 001 under both the old and new systems are compared and, if satisfactory, BGRS is abandoned and OGRS is adopted for section 001, effective with the spring 20X9 semester. Also in spring 20X9, section 002 (perhaps all other AIS sections) runs BGRS and OGRS in parallel. If the results for 002 are also satisfactory, it switches to OGRS in summer 20X9 and so on.

205.


206.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.