Chapter 01 The Information System: An Accountant's Perspective
Chapter 01 The Information System: An Accountant's Perspective
Chapter 01 The Information System: An Accountant's Perspective
5. A balance sheet prepared in conformity with GAAP is an example of discretionary reporting.
a. True
b. False
ANSWER: False
6. The management reporting system provides the internal financial information needed to manage a business.
a. True
b. False
ANSWER: True
7. Most of the inputs to the general ledger system come from the financial reporting system.
a. True
b. False
ANSWER: False
8. When preparing discretionary reports, organizations can choose what information to report and how to
present it.
a. True
b. False
ANSWER: True
11. The database administrator is responsible for the security and integrity of the database.
a. True
b. False
ANSWER: True
14. Information technology (IT) audits can be performed by both internal and external auditors.
a. True
b. Fals
e
ANSWER: True
16. A database is a collection of interconnected computers and communications devices that allows users to
communicate, access data and applications, and share information and resources.
a. True
b. Fals
e
ANSWER: Fals
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class Date:
:
18. Cloud computing is a practice in which the organization sells its IT resources to a third-party outsourcing vendor then
leases back IT services from the vendor for a contract period.
a. True
b. Fals
e
ANSWER: Fals
e
19. A potential benefit of cloud computing is that the client firm does not need to know where its data are being
processed.
a. True
b. Fals
e
ANSWER: Fals
e
20. One of the greatest disadvantages of database systems is that all data is always available to all users.
a. True
b. Fals
e
ANSWER: Fals
e
21. Under SOX legislation public accounting firms are no longer allowed to provide consulting services to audit
clients.
a. True
b. Fals
e
ANSWER: True
24. Which level of management is responsible for short-term planning and coordination of activities necessary
to accomplish organizational objectives?
a. operations management
b. middle management
c. top management
d. line management
ANSWER: b
26. Location-independent computing in which shared data centers deliver hosted IT services over the Internet is
called
a. IT outsourcing
b. network administration
c. cloud computing
d. custom software
ANSWER: c
27. The value of information for users is determined by all of the following except
a. reliability
b. relevance
c. convenience
d. completeness
ANSWER: c
31. The major difference between the financial reporting system (FRS) and the management reporting system
(MRS) is the
a. FRS provides information to internal and external users; the MRS provides information
to internal users
b FRS provides discretionary information; the MRS provides nondiscretionary
. information
c. FRS reports are prepared using information provided by the general ledger system;
the MRS provides information to the general ledger system
d FRS reports are prepared in flexible, nonstandard formats; the MRS reports are
. prepared in standardized, formal formats
ANSWER: a
32. The purpose of the transaction processing system includes all of the following except
a. converting economic events into financial transactions
b. recording financial transactions in the accounting records
c. distributing essential information to operations personnel to support their daily
operations
d. measuring and reporting the status of financial resources and the changes in those
resources
ANSWER: d
33. The transaction processing system includes all of the following cycles except
a. the revenue cycle
b. the administrative cycle
c. the expenditure cycle
d. the conversion cycle
ANSWER: b
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class Date:
:
35. When designing the data collection activity, which type of data should be avoided?
a. data that is relevant
b. data that is efficient
c. data that is redundant
d. data that is accurate
ANSWER: c
37. In a database, a complete set of attributes for a single occurrence of an entity class is called a
a. key
b. file
c. record
d. character
ANSWER: c
43. Which function manages the financial resources of the firm through portfolio management, banking, credit
evaluation, and cash receipts and disbursements?
a. accounting
b. finance
c. materials management
d. distribution
ANSWER: b
51. The objectives of all information systems include all of the following except
a. support for the stewardship function of management
b. evaluating transaction data
c. support for the day-to-day operations of the firm
d. support for management decision making
53. An appraisal function housed within the organization that performs a wide range of services for management
is
a. internal auditing
b. data control group
c. external auditing
d. database administration
ANSWER: a
57. An internal audit department’s independence is compromised when the department reports to:
a. the company controller
b. the audit committee of the board of directors
c. Both a. and b.
62. Accountants play many roles relating to the accounting information system, including all of the following
except
a. system users
b. system designers
c. system auditors
d. system converters
ANSWER: d
Completion
63. Entities outside the organization with a direct or indirect interest in the firm, such as stockholders, financial
institutions, and government agencies, are called ____________________.
Copyright Cengage Learning. Powered by Cognero. Page 10
Name: Class Date:
:
64. Location-independent sharing of data centers hosting IT servers over the Internet is called
______________________________.
ANSWER: cloud computing
66. A practice in which an organization sells its IT resources and leases them back is called
___________________________________.
ANSWER: IT outsourcing
67. The task of locating and transferring an existing record from the database for processing is called data
____________________.
ANSWER: retrieval
69. Three activities that are part of the finance function are __________________________,
__________________________, and __________________________.
ANSWER: portfolio management, treasury, credit evaluation, cash disbursements, cash receipts,
banking
70. Two distinct ways to structure the data processing function are ____________________ and
____________________.
ANSWER: centralized, distributed
73. Sales of products to customers, purchases of inventory from vendors, and cash disbursements are all
examples of __________________________.
ANSWER: financial transactions
77. The tests that focus on the system itself and how it is designed to reduce risk is called
____________________.
ANSWER: tests of controls
78. Sarbanes-Oxley legislation requires that management designs and implements controls over the entire
financial reporting process. What systems does this include?
ANSWER This includes the financial reporting system, the general ledger system, and the
: transaction processing systems that supply the data for financial reporting.
79. Why is it necessary to distinguish between accounting information systems (AIS) and management
information systems (MIS)?
ANSWER: Because of the highly integrative nature of modern information systems, management and auditors need a
conceptual view of the information system that distinguishes key processes and areas of risk and legal
responsibility from the other (non-legally binding) aspects of the system. Without such a model, critical
management and audit responsibilities under SOX may not be met.
80. How has SOX legislation impacted the consulting practices of public accounting firms?
ANSWER: Prior to SOX, a gray area of overlap existed between assurance and consulting services. Auditors were once
allowed to provide consulting services to their audit clients. They are now prohibited from doing so under SOX
legislation.
Essay
83. Contrast the responsibilities of operations management, middle management, and top management. Explain the
different information needs for each level of management.
ANSWER: Operations management is directly responsible for controlling day-to-day operations. Operations managers
require detailed information on individual transactions such as sales, shipment of goods, usage of labor and
materials in the production process, and internal transfers of resources from one department to another.
Budgeting information and instructions flow downward from top and middle management to operations
management.
Top management is responsible for longer-term planning and setting organizational objectives. Information
provided to top management is highly summarized.
86. Several advantages of cloud computing have been discussed. Discuss at least three.
ANSWER: The advantages of cloud computing include access to whatever computing power it needs, paying only for
what is used, and flexible and relatively short-term computing contracts.
87. Name and explain the purpose of the three major subsystems of the accounting information system (AIS):
88. What are the three primary functions performed by the transaction processing system?
ANSWER The primary functions are converting economic events into financial transactions,
: recording financial transactions in the accounting records (journals and ledgers), and
distributing essential financial information to operations personnel to support daily
operations.
92. Distinguish between the accounting information system and the management information system.
ANSWER: The accounting information system processes financial (e.g., cash receipts) and nonfinancial (e.g., addition to
the approved vendor list) transactions that directly affect the processing of financial transactions. These are
handled by the three major subsystems: transaction processing, general ledger/financial reporting, and
management reporting. The management information system processes additional nonfinancial transactions
that contribute to the decision making of managers.
94. Why is it important to organizationally separate the accounting function from other functions of the
organization?
ANSWER: The accounting function provides record-keeping services for all of the operations and day-to-day activities of
other departments, which affect the financial position of the organization. Record keeping tasks must be kept
separate from any area that has custody over assets. Thus, the accounting function must remain independent so
that the protection of the firm’s assets is carried out in an environment with minimum possibilities for theft.
95. How does SOX affect the provision of attest and advisory services
ANSWER Prior to the passage of SOX, accounting firms could provide advisory services
: concurrently to audit (attest function) clients. SOX legislation, however, greatly
restricts the types of non-audit services that auditors may render audit clients. It is now
unlawful for a registered public accounting firm that is currently providing attest
services for a client to provide the following services: bookkeeping or other services
related to the accounting records or financial statements of the audit client, financial
information systems design and implementation, appraisal or valuation services,
fairness opinions, or contribution-in-kind reports, actuarial services, internal audit
Copyright Cengage Learning. Powered by Cognero. Page 14
Name: Class Date:
:
96. What are the similarities and differences between external auditors and internal auditors?
ANSWER The characteristic that conceptually distinguishes external auditors from internal
: auditors is their respective constituencies: while external auditors represent outsiders,
internal auditors represent the interests of the organization. Nevertheless, in this
capacity, internal auditors often cooperate with and assist external auditors in
performing aspects of financial audits. This cooperation is done to achieve audit
efficiency and reduce audit fees. For example, a team of internal auditors can perform
tests of computer controls under the supervision of a single external auditor. The
independence and competence of the internal audit staff determine the extent to which
external auditors may cooperate with and rely on work performed by internal auditors.
External auditors can rely in part on evidence gathered by internal audit departments
that are organizationally independent and report to the board of directors’ audit
committee. A truly independent internal audit staff adds value to the external audit
process.
97. What are fraud audits and why have they become more common?
ANSWER The objective of a fraud audit is to investigate anomalies and gather evidence of fraud
: that may lead to criminal conviction. Sometimes fraud audits are initiated when
corporate management suspects employee fraud. Alternatively, boards of directors may
hire fraud auditors to investigate their own executives if theft of assets or financial
fraud is suspected. Organizations victimized by fraud usually contract with specialized
fraud units of public accounting firms or with companies that specialize in forensic
accounting. In recent years, fraud audits have increased in popularity as a corporate
governance tool. They have been thrust into prominence due to a corporate
environment in which both employee theft of assets and major financial frauds by
management (e.g., Enron and WorldCom) have become rampant.