AIS FINAL Na Q Only
AIS FINAL Na Q Only
AIS FINAL Na Q Only
TRUE/FALSE
F 1. According to the REA philosophy, information systems should support only the needs of accounting professionals.
T 2. Many believe that the accounting profession should shift away from debits and credits toward providing information
that assists decision-making.
T 3. Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are
incapable of providing.
F 4. The REA model is an alternative accounting framework for modeling an organization’s critical resources, events, and
accounts.
F 5. In REA, resources are assets of the organization as shown on a traditional balance sheet.
T 6. In REA, events can be operating, information, or decision/management events.
T 7. REA agents are individuals and departments that participate in an economic event.
T 8. In a relational database environment, the focus is on transaction events, not the accounting artifacts.
F 9. Under the REA approach to database design, an entity relationship diagram is used to model the relationships between
an organization’s critical resources, events, and agents.
T 10. Operating events are activities that produce goods and services.
F 11. Decision/management events are activities associated with recording, maintaining, and reporting information.
F 12. Information events are activities that lead to decisions being made.
T 13. Entity relationship diagrams include operating, information, and decision events. Only operating events are included in
an REA model.
F 14. A data flow diagram is a data modeling tool that enables organizations to view each business process in detail.
T 15. The primary purpose of an ER diagram is to identify data attributes that represent the conceptual user views that must
be supported by the base tables.
F 16. The REA approach generates an information system with only one user view.
T 17. Organizations that use REA produce financial statements and reports directly from the event-driven data, not from
traditional ledgers and journals.
F 18. The REA model may enhance efficiency and competitive advantage though often productivity may decline.
F 19. User views are set by REA modeling.
T 20. REA focuses on business activities within business processes. It is event-oriented.
MULTIPLE CHOICE
2. The REA approach leads to more efficient operations in all of the following ways except
a. identifying non-value-added activities
b. storage of both financial and nonfinancial data in the same database
c. storage of detailed data to support a wider range of management decisions
d. standardizing data forms for simplicity
12. Which of the following represents the order of the steps in the preparation of an REA model?
a. organize events in order, identify resources and agents, identify links, identify operating
events, assign cardinalities
b. identify operating events, identify resources and agents, identify links, assign
cardinalities, organize events in order
c. identify operating events, organize events in order, identify resources and agents,
identify links, assign cardinalities
d. identify resources and agents, identify operating events, organize events in order,
identify links, assign cardinalities
14. Which of the following is not an advantage of using the REA model?
a. greater efficiency
b. increased productivity
c. more relevant and timely information
d. simpler database creation
19. The concept of duality means that an REA diagram must consist of
a. two events—one of them economic and the other support.
b. two agents—one of them internal and the other external.
c. two resources—one increased and the other decreased by the same event.
d. all of the above.
e. none of the above.
23. Which of the following events would be LEAST likely to be modeled in an REA diagram?
a. customer inquiries
b. sales to a customer
c. accounts payable
d. cash
e. all of these events would be modelled
24. Which of the following associations would most likely describe the relationship between an internal
agent and an economic event?
a. 1:M
b. 1:1
c. M:M
d. 0:M
e. none of the above
25. Which of the following tables would most likely have a composite key?
a. Take Order
b. Ship Goods
c. Inventory-Ship Link
d. Cash
e. none of the above
26. Which of the following associations requires a separate table in the database?
a. 1:1
b. 1:M
c. M:M
d. all of the above
29. Bentley Restoration Company restores and sells top-end classic and antique automobiles. Most of its customers are private
collectors, but some are investors who buy multiple cars and hold them for resale. Bentley extends no credit terms. All sales
are for cash. Which of the following best describes the association between Auto Inventory (resource) and Sell Auto (event)?
a. 1,1 : 1,M
b. 1,M : 0,1
c. 0,M : 1,1
d. 1,M : 1,1
30. Which of the following is not a difference between ER and REA diagrams?
a. entities in REA diagrams are organized by class
b. there are more entities in an REA diagram than an ER diagram
c. ER diagrams always use noun naming conventions, while events in REA diagrams use verb names
d. REA diagrams focus on sequence of events from top to bottom
e. all of these are differences between ER and REA diagrams
31. The concept of duality means that an REA diagram must consist of
a. two resources: one increase and the other decreased by the same event
b. two events: one economic and the other support
c. two agents: one internal and the other external
d. none of these
e. all of these
32. When assigning foreign keys in a 1:1 association
a. the primary key on the 0,1 side should be embedded as the foreign key on the 1,1 side
b. the primary key on the 1,1 side should be embedded as the foreign key on the 0,1 side
c. the primary key of each table should be embedded as a foreign key in the related table
d. none of these
34. The concept of duality means that a REA diagram must consist of:
a. two events, one of them economic and the other support
b. two agents, one of them internal and the other external
c. two resources, one increased and the other decreased by the same event
d. none of the above
36. Which of the following events would be least likely to be modeled in a REA diagram?
a. customer inquiries
b. posting accounts payable
c. receiving cash
d. sales to a customer
TRUE/FALSE
F 1. The primary goal of installing an ERP system is reducing system maintenance costs.
T 2. The recommended data architecture for an ERP includes separate operational and data warehouse databases.
F 3. A closed database architecture shares data easily.
T 4. ERP systems support a smooth and seamless flow of information across organizations.
F 5. OLAP stands for on-line application processing.
T 6. The primary goal of installing an ERP system is achieving business process reengineering to improve customer service,
reduce production time, increase productivity, and improve decision-making.
T 7. Day-to-day transactions are stored in the operational database.
F 8. Data mining typically focuses on the operational databaseS
F 9. Companies are more likely to modify an ERP to accommodate the company than to modify company processes to
accommodate the ERP.
T 10. If a chosen ERP cannot handle a specific company process bolt-on software may be available.
F 11. Core applications are also called OLAP.
T 12. The client/server model is a form of network technology in which user computers, called clients, access ERP programs
and data via a host computer called a server.
T 13. A data warehouse is a relational or multi-dimensional database that may require hundreds of gigabytes of storage.
T 14. Drill-down capability is an OLAP feature of data mining tools.
T 15. Supply-chain management software is a type of program that supports efforts relative to moving goods from the raw
material stage to the customer.
F 16. In two-tier architecture, the database and application functions are separated.
F 17. Slicing and dicing permits the disaggregation of data to reveal underlying details.
F 18. Data entered into the data warehouse must be normalized.
T 19. OLAP includes decision support, modeling, information retrieval, and what-if analysis.
T 20. Efficient supply-chain management provides firms with a competitive advantage.
T 21. The big-bang approach involves converting from old legacy systems to the new ERP in one implementation step.
F 22. In a two-tier architecture approach is used primarily for wide area network (WAN) applications.
F 23. Data cleansing is a step performed by external auditors to identify and repairing invalid data prior to the audit.
MULTIPLE CHOICE
6. Which of the following statements is least likely to be true about a data warehouse?
a. It is constructed for quick searching and ad hoc queries.
b. It was an original part of all ERP systems.
c. It contains data that are normally extracted periodically from the operating databases.
d. It may be deployed by organizations that have not implemented an ERP.
20. Separating the data warehouse from the operations databases occurs for all of the following reasons except
a. to make the management of the databases more economical
b. to increase the efficiency of data mining processes
c. to integrate legacy system data into a form that permits entity-wide analysis
d. to permit the integration of data from diverse sources
22. Each of the following is a necessary element for the successful warehousing of data EXCEPT
a. cleansing extracted data.
b. transforming data.
c. modeling data.
d. loading data.
e. all of the above are necessary.
23. Which of the following is typically NOT part of an ERP’s OLAP applications?
a. decision support systems
b. information retrieval
c. ad hoc reporting/analysis
d. logistics
e. what-if analysis
24. There are a number of risks that may be associated with ERP implementation. Which of the following was
NOT stated as a risk in the chapter?
a. A drop in firm performance after implementation because the firm looks and works differently than it did
while using a legacy system.
b. Implementing companies have found that staff members, employed by ERP consulting firms, do not have sufficient
experience in implementing new systems.
c. Implementing firms fail to select systems that properly support their business activities.
d. The selected system does not adequately meet the adopting firm’s economic growth.
e. ERPs are too large, complex, and generic for them to bewell integrated intomost company cultures.
28. SAP, one of the leading ERP producers, makes several modules available to adopters. Which of the following is not a SAP
module?
a. Business Process Support
b. Internet Development Support
c. Logistics
d. E-Commerce Support
e. Human Resources
32. Which of the following is not a risk associated with ERP implementation?
a. Implementing companies have found that staff members, employed by ERP consulting firms, do not have sufficient
experience in implementing new systems.
b. The selected system does not adequately meet the adopting firm's economic growth.
c. A drop in firm performance after implementation because the firm looks and works differently than it did while using a
legacy system.
d. Implementing firms fail to select systems that properly support their business activities.
e. All of the are risks associated with ERP implementation.
34. Which of the following is not a risk associated with ERP implementation?
a. opposition to changes in the business culture
b. choosing the wrong ERP
c. choosing the wrong consultant
d. All of these are risks associated with ERP implementations.
36. Which of the following is a reason that data warehouses are created and maintained separately from operational
databases?
a. A separate centralized data warehouse is an effective means of collecting data from diverse sources.
b. Audit controls require that data for management analysis be kept separate from transaction data.
c. No ERP system incorporates data warehousing capability.
d. The data is used in different ways that requires it to be physically separate.
Chapter 12—Electronic Commerce Systems
TRUE/FALSE
T 1. Because of network protocols, users of networks built by different manufacturers are able to communicate and
share data.
F 4. The phrase “.com” has become an Internet buzz word. It refers to a top-level domain name for communications or-
ganizations.
T 6. The network paradox is that networks exist to provide user access to shared resources while one of its most im-
portant objectives is to control access.
T 7. Business risk is the possibility of loss or injury that can reduce or eliminate an organization’s ability toachieve its ob-
jectives.
T 9. The rules that make it possible for users of networks to communicate are called protocols.
T 10. A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear
of negative publicity.
F 11. Cookies are files created by user computers and stored on Web servers.
F 13. The client-server model can only be applied to ring and star topologies.
T 14. The most popular topology for local area networks is the bus topology.
T 15. A network topology is the physical arrangement of the components of the network.
T 17. In a hierarchical topology, network nodes communicate with each other via a central host computer.
T 20. EDI is the inter-company exchange of computer processible business information in standard format.
MULTIPLE CHOICE
a. file server
c. multiplexer
d. bridge
c. file servers permit software and data to be shared with other network users
4. Which topology has a large central computer with direct connections to a periphery of smaller
computers? Also in this topology, the central computer manages and controls data communications
a. star topology
b. bus topology
c. ring topology
d. client/server topology
b. individual workstations can function locally but cannot communicate with other workstations
c. individual workstations cannot function locally and cannot communicate with other workstations
d. the functions of the central site are taken over by a designated workstation
a. is best suited to the token-ring topology because the random-access method used by this model detects data colli-
sions.
7. What do you call a system of computers that connects the internal users of an organization that is distributed over a
wide geographic area?
a. LAN
b. decentralized network
c. multidrop network
d. Intranet
8. Sniffer software is
a. software used by malicious Web sites to sniff data from cookies stored on the user’s hard drive
c. used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
d. illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
9. In a ring topology
c. shared resources are managed by a file server which is a node on the ring
a. increases the amount of data that is transmitted between the central file and the network node
c. reduces the number of records that must be locked by having the file server perform record searches
c. for environments where network nodes routinely communicate with each other
d. when the central database does not have to be concurrent with the nodes
a. the network consists of a central computer which manages all communications between nodes
c. all nodes are of equal status; responsibility for managing communications is distributed among the nodes
13. Which method does not manage or control data collisions that might occur on a network?
a. multiplexing
b. polling
c. carrier sensing
d. token passing
15. All of the following are true about the Open System Interface (OSI) protocol except
a. within one node different layers communicate with other layers at that node
c. specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
d. layers at each node communicate logically with their counterpart layers across nodes
16. Which of the following statements is correct? TCP/IP
17. XBRL
d. was designed to provide the financial community with a standardized method for preparing
18. FTP
d. is used to transfer text files, programs, spreadsheets, and databases across the Internet.
19. HTML
d. is used to transfer text files, programs, spreadsheets, and databases across the Internet.
d. URL masquerading
b. derived from the digest of a document that has been encrypted with the sender’s private key
23. HTTP
d. is used to transfer text files, programs, spreadsheets, and databases across the Internet.
a. Packet switching combines the messages of multiple users into a “packet” for transmission. At the receiving end, the
packet is disassembled into the individual messages and distributed to the intended users.
b. The decision to partition a database assumes that no identifiable primary user exists in the organization.
c. Message switching is used to establish temporary connections between network devices for the duration of a com-
munication session.
d. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary
computer completes processing its transaction and releases the data needed by other users.
25. NNTP
a. TCP/IP is the basic protocol that permits communication between Internet sites.
d. TCP/IP is used to transfer text files, programs, spread sheets, and databases across the Internet.
e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.
27. Which of the following best describes a system of computers that connects the internal users of an organization dis-
tributed over a wide geographic area?
a. LAN
b. Internet
c. decentralized network
d. multidrop network
e. intranet
a. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive.
c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions.
d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers.
e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.
30. A message that is contrived to appear to be coming from a trusted or authorized source is called
d. URL masquerading.
e. a SYN-ACK packet.
a. is more intensive than a Dos attack because it emanates from single source.
c. is so named because it affects many victims simultaneously, which are distributed across the Internet.
d. turns the target victim’s computers into zombies that are unable to access the Internet.
a. URL masquerading.
d. a smurf attack
e. a SYN-ACK packet.
b. is derived from the digest of a document that has been encrypted with the sender’s private key.
c. is derived from the digest of a document that has been encrypted with the sender’s public key.
34. Which of the following statements about the client-server model is correct?
a. It is best suited to the token ring topology because the random-access method this topology uses detects data colli-
sions.
b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring to-
pology.
c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and pre-
vents data loss during transmissions.
d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node
rather than only a single record.
b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the
packet is disassembled into individual messages and distributed to the user.
c. The decision to partition a database assumes that no identifiable primary user exists in the organization.
d. Message switching is used to establish temporary connections between network devices for the duration of a com-
munications session.
e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary
computer completes processing its transaction and releases the data the other nodes need