Accounting Information System: Midterm Exam
Accounting Information System: Midterm Exam
Midterm Exam
Group 3
Submitted to:
Mr. Rhamir C. Dalioan
Submitted by:
Sellon, Lea Grace A.
Soriano, Kristine Andrea M
Nucasa Ma. Isabel M.
Saragosa, Chastine
Impas, Key S.
Masire, Mofidah
TABLE OF CONTENTS
PAG
E(s)
PART I. Multiple Choice Theories
Electronic Data Processing Controls………………………………………………….4-5
By Key S. Impas
Parallel Simulation……………………………………………………………………..17-18
By Kristine Andrea M. Soriano
Isabel Nucasa
2
PAG
E(s)
PART II. Suggested answers and explanation
General Controls and Aplication Controls………………………………………….. . 26
By Key S. Impas
Parallel Simulation……………………………………………………………………….32-33
By Kristine Andrea M. Soriano
Isabel Nucasa
3
PART I
GENERAL CONTROLS
1. Which of the following terms best describes the type of control evidenced by
personal identification number or password? It must be private to restrict access.
A. System development control
B. Hardware control
C. Access control
D. Application control
2. The one who design and develop new systems by choosing and configuring
hardware and software?
A. System analyst
B. Programmer
C. Computer operator
D. Librarian
3. In an online computer-based system, which of the following may be used to ensure
that users have proper authorization to perform task?
A. Check digit
B. Passwords
C. Control totals
D. Limit test
4. General control that detect and control errors arising from the use of equipment?
A. Equipment controls
B. Hardware controls
C. System controls
D. A and B
5. _______ is to assure the continuity of the operation in the event of physical
disaster.
A. Back-up files
B. System development and Documentation
C. Data and other procedural controls
D. A and D
4
6. To avoid invalid input, a bank added extra number at the end of each account
number and subjected the new number to algorithm. This technique is known as?
A. Dual read
B. Test for reasonableness
C. Check digit
D. Occurrence correction
7. _______ designed to check that processing results is valid output and that outputs
are distributed properly to users.
A. Application control
B. Input control
C. Processing control
D. Output control
8. For control purposes, data clerks total up the employee Social Security numbers in
each batch of payroll transactions. Which of the following terms best describes the
resulting total?
A. Hash total
B. Financial total
C. Parity total
D. Record count
9. For control purposes, data clerks total up the employee gross pay amounts in each
batch of payroll transactions. Which of the following terms best describes the
resulting total?
A. Hash total
B. Financial total
C. Parity total
D. Record count
10. A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of
the following controls would detect this error during processing?
A. Hash total
B. Financial total
C. Limit check
D. Check digit
5
REVENUE ACCOUNTING SYSTEM
1. The maximum allowable account balance for a given customer is called the
a. Credit checkpoint
b. Credit limit
c. Reorder point
d. Backorder point
2. What is the normal procedure for new customers or customers making a purchase
that causes their credit limit to be exceeded?
a. Routine approval is granted without authorization
b. Specific approval must be granted by the credit manager
c. Reject the sale in either case without question
d. Check the credit bureau for a credit rating on the customer
3. Which batch totals are manually calculated for each batch in a typical sales order
entry system?
a. The record count and hash total of the quantities ordered
b. The financial total of the amounts billed to the customer and hash total of the
quantities ordered
c. The line count and record count
d. The record count and hash total of the sales order numbers
4. Most companies recognize sales when
a. Customer order is received
b. The merchandise is shipped
c. The merchandise is received by the customer
d. Cash is received on account
6. Which of the following transactions is not recorded in the cash receipts journal?
a. Expensing prepaid rent
b. Receipt of customer payments
c. Borrowing money from a bank
6
d. Sale of equipment for cash
7. For a retail store such as Wal-Mart, the relationship between sales and inventory
items is most likely to be represented as being which of the following
a. One-to-one
b. One-to-many
c. Many-to-one
d. Many-to-many
9. For good internal control over customer remittances, the mailroom clerk should
separate the checks from the remittance advices and send them to whom?
a. Billing
b. Accounts receivable
c. Cashier
d. Controller
7
DISBURSEMENT ACCOUNTING SYSTEM
4. When goods are being ordered from a vendor, which electronic files are either read
or updated?
a. Inventory, vendors, and accounts payable
b. Vendors and accounts payable
c. Open purchase orders and accounts payable
d. Inventory, vendors, and open purchase orders
5. What aspect below best characterizes a JIT inventory system?
a. Frequent deliveries of smaller quantities of items to the work centers.
b. Frequent deliveries of large quantities to be held at the work centers.
c. Less frequent deliveries of large quantities of goods to central receiving.
d. Infrequent bulk deliveries of items directly to work centers.
9. The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the ________ function in the company.
a. Inventory control
b. Stores
c. Production
d. Purchasing
10. All of the following technologies could be useful aids in the receiving process
except?
a. Bar coding
b. Radio frequency identification tags
c. EFT
d. Satellite technology
9
AUDTING AROUND COMPUTER
1. When the client uses a computer but the auditor chooses to use only the
non-IT segment of internal control to assess control risk, it is referred to
as auditing around the computer. Which one of the following conditions
need not be present to audit around the computer?
a. Computer programs must be available in English.
b. The source documents must be available in a non-machine
language.
c. The documents must be filed in a manner that makes it possible to
locate them.
d. The output must be listed in sufficient detail to enable the auditor to
trace individual transactions.
4. Typical controls developed for manual systems which are still important
in IT systems include:
a. proper authorization of transactions.
b. competent and honest personnel.
c. careful and complete preparation of source documents.
d. all of the above.
11
AUDITING THROUGH COMPUTER
12
a. Ability to process large volumes of transactions.
b. Ability to replace manual controls with computer-based controls.
c. Reduction in misstatements due to consistent processing of
transactions.
d. Over-reliance on computer-generated reports.
15
PARALLEL SIMULATION
1. Involves the auditor writing a computer program that replicates some part of a
client’s application system, processes actual client data through an auditor’s
generalized audit software program and compares the output obtained with output
obtained from the client.
a. Parallel simulation
b. Analytical audit techniques
c. Distributed simulation
d. Running massive parallel simulation
16
Parallel simulation is the generation an independent programme to
stimulate/imitate part of an existing application programme, and is designed to
test the validity and verify the accuracy of an existing application
programme/cluster of application programmes
Statement B
Computer assisted audit techniques (CAATs) can be defined as any single, any
group and/or, any cluster of audit techniques that use information technology-
based applications as a primary investigative tool.
Which of the following combinations is correct?
A. Statement A is False, and Statement B is True
B. Statement A is False, and Statement B is False
C. Statement A is True, and Statement B is False
D. Statement A is True, and Statement B is True
6. Parallel simulation programs used by the auditors for testing programs:
A. Must simulate all functions of the production computer-application system.
B. Cannot be developed with the aid of generalized audit software.
C. Can use live data or test data.
D. Is generally restricted to data base environments.
17
10. The Primary types of auditors include?
a. Dependent, internal and external (private)
b. Independent, internal and external (Government)
c. Internal and external only
d. Dependent and independent
2. To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of?
a. Accountant
b. Consultant
c. Controller
d. Auditor
9. After a full operational contingency test, the IS auditor performs a review of the
recovery steps and concludes that the elapsed time until the technological
environment and systems were actually functioning exceeded the required critical
recovery time. Which of the following should be auditors recommend?
a. Broaden the processing capacity to gain recovery time.
b. Make improvements in the facility’s circulation structure.
c. Perform an Integral review of the recovery tasks.
d. Increase the amount of human resources involved in the recovery.
20
6. Consider the following about Batch Processing:
I. It demands fewer organizational resources
II. Masterfile are not updated immediately
III. Processing takes place when the economic event occurs.
21
ON-LINE REAL TIME PROCESSING
a. Ease of implementation
b. Ease of auditing
c. Timelines of information
d. Efficiency of processing
2. Online real-time system typically requires three basic sub processes to be completed
before an event is converted into information that can be used by decision makers.
22
a. the data processing mode in which there is a significant delay between any two
data processing steps
b. the data processing mode in which there is little or no delay between any two data
processing steps
d. Both A and C
a. Continual input,
b. Process
c. Output of data.
a. Time consuming
b. Expensive to buy
c. Both A and B
a. Data input
b. Data collection
c. Data processing
d. Data storage
a. Saving Time
23
9. All statements are true about Online Real-Time processing method except:
c. Systems gather business event data at the time of occurrence, update the master
data almost instantaneously, and provide the results arising from the business event within
a very short time
d. Assembly lines use real time processing to reduce time, cost and errors.
b. Direct Processing
c. Batch Processing
d. Transaction Processing
24
PART II
Suggested Answers
1. C. Access control
Access control would only cover access approval, authentication and access control
are often combined into a single operation, authentication methods and tokens
include passwords, personal identification numbers and etc.
2. A. System analyst
System analyst set up new computer systems, both the hardware and software add
new software applications to increase computer productivity.
3. B. Password
Access controls is a way of limiting access to a system or to physical or virtual
resources to ensure that users have proper authorization to perform a task.
4. D. A and B
Hardware controls or Equipment controls are computer controls built into physical
equipment by the manufacturer to detect and control errors arising from the use of
equipment.
5. D. A and D
Data and other procedural controls also known as “back-up files” assures the continuity
of the operation in the event of any physical disaster.
6. C. Check digit
Single digit placed consistently in any position. Number added to a code to derive a
further number as a means of verifying the accuracy or validity of the code as it is
printed or transmitted.
7. D. Output control
The output controls describes the immediate results of the process. Compare output
results with expected results by checking the output against the input.
8. A. Hash total
25
The sum of unrelated numbers. The hash total does not provide useful data, but is
used as a check to ensure inputs were entered correctly.
9. B. Hardware controls
Financial total is normally used in batch processing method. Financial data consists of
pieces or sets of information related to the financial health of the business.
10. D. Check digit
Number added to a code to derive a further number as a means of verifying the
accuracy or validity of the code as it is printed or transmitted. Single digit placed
consistently in any position.
1. Answer: B
- A credit limit is refers to the maximum amount of loan that the seller accepts to
grants to its customer.
2. Answer: B
-Credit manager is the one manage and make decisions concerning credit limits.
3. Answer: A
-The record count and hash total of the quantities ordered is the manually
calculated for each batch in a typical sales order entry system.
4. Answer: B
- We consider revenue when the goods is shipped
5. Answer: B
- Amounts owed to the business by its customers for merchandise purchased on account
are accounts receivables of the business. Details of customer’s accounts receivables
are maintained in the accounts receivable subsidiary ledger.
6. Answer: A
- The cash receipts journal is used to record all cash received by the business. Of the
items listed, only “expensing of prepaid rent” does not involve the receipt of cash.
7. Answer: D
- Wal-Mart is big retail store so the relationship between the sales and inventory items
represented as "many to many".
8. Answer: A
- The credit manager’s function is to approve credit memos.
9. Answer: C
- This is the cashiers’ job. The cashier function has custody of cash accounts.
10. Answer: C
- The revenue cycles primary objective is to provide the right product in the right place at
the right time for the right place.
26
DISBURSEMENT ACCOUNTING SYSTEM
1. Answer C.
Reverse auction is a type of auction in which the roles of buyer and seller are reversed.
It is one technique that may reduce purchasing.
2. Answer D
Disbursement voucher is a form used to have a check made to pay an individual or an
organization for merchandise sold or service rendered. There are no disadvantages
to using disbursement voucher.
3. Answer D.
The final activity in the expenditure cycle is the payment of approved invoices.
4. Answer D
Inventory vendors and open purchase orders are electronic files that you can read
when goods are being ordered from a vendor.
5. Answer A.
JIT is frequent deliveries of smaller quantities of items to the work centers.
6. Answer C.
Credit rating of vendor would not be a major certain in vendor selection.
7. Answer D.
Purchase order is a document formally requesting a vendor to sell a certain product at
a certain price. A request for delivery of certain items and quantities.A contract
between the buyer and vendor once accepted by the vendor.
8. Answer C
Copies of the purchase order are typically sent to the vendor and to the receiving and
accounts payable departments.
9. Answer C.
The receiving and storage of goods is the responsibility of the receiving department,
which usually reports to the production.
10. Answer C.
EFT is a form of counseling intervention that draws on various theories of alternative
medicine
it is not useful aid in the receiving process.
27
AUDITING AROUND
1.A.
Computer programs must be available in English.
2. C
. processing controls.
3.B
. understanding of the system.
4.D
. all of the above.
5 D.
It may take the recordkeeping function and the document preparation function
away from those who have custody of assets and put those functions into the IT
center
6. D.
general controls
7. C
. Observation of transaction processing
8. C
. auditing around the computer.
9. C
. Processing controls.
10. B
. review of data for reasonableness by someone who knows what the output should
look like.
28
AUDITING THROUGH
1. A. Pilot simulation.
2. B. observation.
3. D. Over-reliance on computer-generated reports.
4. D. Programming is not allowed online and must be done separately.
5. B. Increased human involvement.
6. D. Manual controls replace automated controls.
7. C. Improved audit trail
8. C. Hardware controls.
9. C. Physical and online security.
10. D. Application controls relate to the processing of individual transactions
29
TEST DATA APPROACH- Answers
1. C- Prepare transaction and results is the first step in test data approach.
2. B-Test transaction should be Logical process
3. D- Requires limited technical knowledge is not a disadvantage of test data
approach
4. D - Cost for constructing test data, pre determine the result manually and
ascertaining which controls to be tested.
5. B – are the four qualities of test data that must possess Realistic, Practically Valid,
Versatile and Cover Scenarios’ and Exceptional Data.
6. B- is the only way to prepare Test Data
7. C - Test data involves auditor preparation of a series of Fictitious transactions
8. B- To define test data approach has one of the White box techniques used by auditors
in a computer assisted auditing techniques
9. B- Auditors process their own test data using the client’s computer system and
application program is the best describes the test data approach
10. D - In auditing through a computer, the test data method is used by auditors to test
the Procedures contained within the program
30
PARALLEL SIMULATION- Answers
1. A- Parallel simulation Involves the auditor writing a computer program that replicates
some part of a client’s application system, processes actual client data through an
auditor’s generalized audit software program and compares the output obtained with
output obtained from the client
4. A The parallel simulation uses generalized audit programs that processes data and
generates output like the original audited program.
5. D- Involves the auditor writing a computer program that replicates some part
of a client’s application system, processes actual client data through an auditor’s
generalized audit software program and compares the output obtained with
output obtained from the client. The method verifies processing of actual
transactions and allows the auditor to verify actual client results. Parallel
simulation
8. D. Parallel Testing
Parallel testing means testing multiple applications or subcomponents of one
application concurrently to reduce the test time. However, distributed testing also
31
presupposes that test parts interact with each other during the test run, while the
parallel testing approach lacks interaction between test parts.
10. A - A financial audit examines the reliability and integrity of financial transactions,
accounting records and financial statement; an information systems audit reviews the
controls of an AIS to assess its compliance with internal control policies and procedures
and its effectiveness in safeguarding assets is a financial audit different from an
information systems audit.
32
INTEGRATED TEST FACILITY (ITF)- Answers
1. B -To audit an AIS in an operational setting is the purpose integrated test facility.
2. D- To examine results of transaction processing to find out how well the AIS does the
tasks required of it is the role of Auditor.
3. D- Supports continuous monitoring of controls, testing can be unscheduled and
unknown to other staff and It provides prima facie evidence of correct program functions
are the advantages in Integrated Test Facility (ITF).
4. A - The potential of corrupting data files with test data that may end up in the Financial
Reporting Process is the disadvantages of Integrated Test Facility (ITF).
5. C -It uses the same programs to compare processing using independently calculated
data. This involves setting up dummy entities on an application system and processing
test or production data against the entity as a means of verifying processing accuracy.
6. C- The first step in auditing a network is to understand the network architecture and
design. This would provide an overall picture of the network of the enterprises and its
connectivity. This will be starting point for identifying the various layers of information and
the access architecture across the various layers, such as proxy servers, firewalls and
client/server application. Reviewing validity of password changes would be performed as
part of substantive testing.
7. B- "Enabling audit trails helps in establishing the accountability and responsibility of
processed transactions by tracing transactions through the system. The objective enabling
software to provide audit trails is not to improve system efficiency, since it often involves
additional processing which may in fact reduce response time for users.
Enabling audit trails does involve storage and thus occupies
disk space. Choice C is also a valid reason however, it is not the primary reason"
8. C.-The least significant would be the description of computer hardware. The
organization would need to have compatible and sufficient hardware to be considered a
viable service provider before contract provisions are reviewed.
9. C.-Performing an exhaustive review of the recovery tasks would be appropriate to
identify the way these tasks were performed, the time allocated to each of the steps
required to accomplish recovery, and determine where adjustments can
be made. Choices A, B, and D could be actions after the
described review has been completed.
10. A-An ITF creates fictitious entity in the database to process test transaction
simultaneously with live input. Its advantage is that periodic testing does not require
separate test process. However, careful planning is necessary, and test data must be
isolated from production data.
33
BATCH PROCESSING METHOD
1. Answer D.
- Because simultaneous posting to several files is most frequently related to an online
real-time processing
2. Answer A.
- In batch processing, there is accumulation of data by bath (record/financial total) prior
to processing.
3. Answer D.
- Batch processing is designed and effective for large volume of similar transactions.
4. Answer B.
- One of the examples of batch processing is the Payroll system wherein there is an
accumulation of data by batch (track of hours, calculating wages, withholding taxes
and reduction).
5. Answer A.
- Batch processing matches input to output and is therefore also a control over
processing and output.
6. Answer C.
- Batch processing method demands fewer organizational resources than on-line-real-
time processing and Masterfile are not immediately updated as transaction occurs,
that is why time delay between transactions exists.
7. Answer B.
- Batch processing method can process large volume of similar transactions
8. Answer C.
- Both statements are characteristic of batch processing method.
9. Answer D.
- Batch system generally requires fewer resources.
10. Answer B.
- Process transactions individually at the moment the event occurs is a
characteristic of an On- line-real time method.
34
ONLINE REALTIME
1. Answer A.
- A turnaround document is a source document generated by the computer system as
output and then later used as input for subsequent processing. Turnaround
documents are least likely to be found in an online, real-time processing system
because it normally does not use source documents.
2. Answer D.
- Computers are designed to include hardware diagnostic routines that allow
identification of hardware problems such as parity check to determine if the integrity
of the bit structure of each character has been destroyed during the internal
transmission of data within the system.
3. Answer A.
- Real time system processes the entire transactions as it occurs with less interaction.
4. Answer C.
- One of the examples of real time processing is the ATM which is expensive to buy.
5. Answer D.
- In online real time processing, as transaction occurs, it is subject for validation with no
time delay.
6. Answer A.
- Online real time processing is expensive to buy. One of the examples is Bank ATM,
radar systems and customer services. Etc.
7. Answer B.
- Is correct because on-line real-time systems are those for which processing is
performed as data are input and the results are available immediately
8. Answer A.
- All of the statements are true with regards to Online real time processing.
9. Answer C.
- Airline reservations system is an example of Online Real time Processing, which
processes requests for services from one traveler at a time while he or she waits.
10. Answer D.
- All of the following are characteristic of Online Real time Processing.
35