ACC 340 Extraordinary Success |snaptutorial.com - PowerPoint PPT Presentation

About This Presentation
Title:

ACC 340 Extraordinary Success |snaptutorial.com

Description:

For more classes visit www.snaptutorial.com Multiple-Choice Questions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed is called: a) Financial shadowing b) Managerial trace technique c) Concatenation d) Audit trail 2. Justifying expenditures for new technologies is especially difficult because: a) You do not know how many jobs will be affected b) Expenses are often – PowerPoint PPT presentation

Number of Views:23
Slides: 27
Provided by: thebeautifulflower
Category:

less

Transcript and Presenter's Notes

Title: ACC 340 Extraordinary Success |snaptutorial.com


1
ACC 340 Final Exam Guide
For more classes visit
www.snaptutorial.com
  • Multiple-Choice Questions
  • 1. The process by which a financial transaction
    is recorded so that its flow through the system
    can be followed is called
  • Financial shadowing
  • Managerial trace technique
  • Concatenation
  • Audit trail
  • 2. Justifying expenditures for new technologies
    is especially difficult because
  • You do not know how many jobs will be affected
  • Expenses are often recurring and are difficult to
    estimate
  • Many benefits are intangible and are not easily
    known or measured
  • Justifying a new technology is no different from
    any other capital budgeting problem
  • 3. The essential steps in performing a systems
    study are (in order of occurrence)
  • Analysis, design, implementation and initial
    operation, follow up
  • Design, planning, follow up, analysis, and
    implementation
  • Planning, system specification, analysis,
    production, implementation
  • Planning, analysis, design, implementation, and
    follow up

2
  • Recording business transactions in a journal
  • Preparing a trial balance
  • Recording closing entries in a journal
  • Preparing transaction source documents
  • none of the above
  • 5. Which systems study step is normally performed
    first?
  • Design
  • Initial operation
  • Follow up
  • Analysis
  • none of the above
  • 6. The purpose of a company firewall is to
  • Guard against spoofing
  • Assist the IETF
  • Deny computer hackers access to sensitive data
  • all of the above

3
  • email address
  • IETF
  • 10. Business process reengineering efforts
    sometimes fail because
  • Management gets too involved in the process
  • Management is too optimistic regarding its
    expectations from its implementation
  • Management support can never overcome employee
  • resistance
  • Employees will never accept change
  • 11. The sales process begins with
  • Placing an order with a vendor
  • A customer order for goods or services
  • Production of goods or services
  • Delivery of goods or services
  • 12. The primary objective in processing revenues
    is to
  • Sell as many goods as possible
  • Achieve timely and efficient cash collection

4
  • 15. Inputs to transaction processing systems
  • Are always in hard copy
  • Are best when input in a graphical format
  • May be in an electronic format when an EDI system
    is used
  • May never be audio
  • 16.Integrated accounting software programs
    generally include all of the following, except
  • Graphic reporting capabilities
  • Internet connectivity
  • One standardized chart of accounts
  • The ability to handle multiple companies
  • 17. Enterprise-wide AISs
  • Almost never pay for themselves
  • Do not include many more features than
    middle-range accounting software packages
  • Are seldom used by multinational organizations
  • Integrate an organizations financial functions
    with its other functional areas
  • 18. Training and change management activities

5
  • 20. Many organizations purchased new AISs during
    the 1990s
  • Because of the need for Year 2000 compliance
  • Because they wanted Internet connectivity
  • In order to take advantage of opportunities for
    reengineering
  • all of the above
  • ..................................................
    ..................................................
    .................
  • .........................................
  • ACC 340 Week 1 Connect Knowledge Check
  • For more classes visit

www.snaptutorial.com
1. The Certified Information Technology
Professional is the position created by the
AICPA to recognize CPAs who have the ability to
provide skilled professional services on
Information Technology. True False 2. The
correct order of effects in the value chain are
Inbound Logistics ? Operations ? Service Inbound
Logistics ? Outbound Logistics ? Marketing
Sales Inbound Logistics ? Operations ? Outbound
Logistics Inbound Logistics ? Operations ?
Shipping 3.
6
Which designation would most appropriate for
those professionals possessing an IT audit,
control and security skills? Certified Internal
Auditor (CIA) Certified Information Systems
Auditors (CISA) Certified Information Technology
Professional (CITP) Certified Public Accountant
(CPA) 4. Business Process Modeling Notation
(BPMN) activity diagrams depict activities as
circles. True False 5. Obligatory business rules
state what should not occur. True False 6. Which
of the following is not a Stewardship and
Reporting role of the Accounting/Finance
Function in Business? Tax returns Regulatory
compliance Statutory reporting Human Resource
management 7. Many hospitals and doctor's
offices are beginning to digitize the medical
records of their patients. This is an example of
the strategic role. Informate - up Automate
Transform Informate - down 8. Which of the
following best describes a business model?
7
A simple, abstract representation of a business
process or processes. A sequence of business
activities. An evaluation of potential business
process improvements. None of the
above. 9. Which of the following is the best
description of an association? The relationship
between two classes The lines in a UML Class
diagram A group of classes The number of times
one class is related to another 10. Which of the
following best describes the purpose of a gateway
in a Business Process Modeling Notation (BPMN)
activity diagram? Controls branching and
merging. Shows where the work takes place.
Describes the sequence of workflow. Affects the
flow of the business process. ....................
..................................................
............................................... ..
....................................... ACC 340
Week 1 Discussion Question 1 For more classes
visit
www.snaptutorial.com
Why do some organizations continue to use both
manual and computerized accounting information
systems? ........................................
..................................................
........................... ......................
...................
8
ACC 340 Week 1 Textbook Assignment Problem 6 Ch.
1
For more classes visit
www.snaptutorial.com
  • Write a response of no more than 1,050 words to
    Problem 6 from Ch. 1, "Accounting Information
    Systems and Firm Value" of Accounting
    Information Systems.
  • Click the Assignment Files tab to submit your
    assignment.
  • Using the accompanying explanations of each IT
    strategic role, suggest the appropriate IT
    strategic role (automate, informate or transform)
    for the following types of IT investments.
    Depending on your interpretation, it is possible
    that some of the IT investments could include two
    IT strategic roles.
  • Digital health records
  • Google Maps that recommend hotels and restaurants
    along a trip path 25
  • Customer relationship management software
    d.Supply chain management software
  • e.Enterprise systems
  • f.Airline flight reservations systems g.PayPal
    (www.paypal.com)
  • h.Amazon.com product recommendation on your
    homepage i.eBay
  • j.Course and teacher evaluations conducted online
    for the first time
  • (instead of on paper)

9
..................................................
..................................................
................. ................................
......... ACC 340 Week 2 Connect Knowledge
Check For more classes visit
www.snaptutorial.com
1.
Control Objectives for Information and related
Technology's (CobIT) guidance is guided by a
structure that corresponds to the SDLC, namely
Plan and Organize, Acquire and Implement, Deliver
and Support and Monitor and Evaluate. True
False 2.
While hierarchical and network data models
require relationships to be formed at the
database creation, relational data models can be
made up as needed. True False 3.
10
The project sponsor is generally the same person
as the project manager. True False 4.
The 100 Rule is a rule requiring 100 planning
of all external tasks. True False 5.
The analysis phase of the SDLC involves a
complete, detailed analysis of the systems needs
of the end user. True False 6.
To convert a conceptual model with a maximum
Multiplicities relationship of "many to many"
into relationship database tables, one
must Many-to-many relationship cannot be
represented in Access. Create a relationship
table to handle the many-to-many relationship.
Create a relation with no attributes of its
own. Create a foreign key in one of the tables to
link the two tables. 7.
11
The Project Manager is the lead member of the
project team that is responsible for the
project. True False 8.
The critical path in a PERT chart represents
The most important tasks of the whole
project. The longest path of tasks needed for
project completion. The tasks that must be
completed without errors. The path of processes
that is critical for system adoption. 9.
The triple constraint of project management
includes the constraint of Adoption Usability Te
chnical issues Time 10. In Access, users can
edit database information in reports.
True False .......................................
..................................................
............................ .....................
....................
12
ACC 340 Week 2 Discussion Question 1
For more classes visit
www.snaptutorial.com
What are some of the hardware components of your
PC at work? How are they different from the
components of your PC at home? ..................
..................................................
.................................................
......................................... ACC
340 Week 2 Discussion Question 2 For more classes
visit
www.snaptutorial.com
What are the benefits and limitations of the
network being used at your organization? .......
..................................................
..................................................
.......... .......................................
.. ACC 340 Week 2 Enterprise Systems Paper For
more classes visit
13
www.snaptutorial.com
  • Prepare a 700- to 1,050-word paper to include the
    following
  • Describe the various types of enterprise wide
    accounting systems used in organizations.
  • Explain how you might use the information system
    development process to implement a new system
    for your organization.
  • Discuss the steps involved in the development
    process.
  • Include a summary of the advantages and
    disadvantages of the different types of
    databases that are used in accounting systems.
  • Click the Assignment Files tab to submit your
    assignment.
  • ..................................................
    ..................................................
    .................
  • .........................................
  • ACC 340 Week 2 Team Assignment Business Process
  • For more classes visit

www.snaptutorial.com
  • Select a company that you are familiar with to
    use as the basis for your assignment.
  • Select a business activity in your selected
    company. For example, the
  • sales activity, the accounting activity, the
    manufacturing activity, the hiring activity,
    etc.
  • Prepare a 10- to 12-slide presentation to include
    the following
  • Speaker notes.

14
  • A description of the business activity process.
  • A Business Process Modeling Notation (BPMN)
    activity model for the selected business
    activity.
  • An explanation of how the use of technology will
    impact this business activity and the accounting
    for this activity.
  • Click the Assignment Files tab to submit.
  • ..................................................
    ..................................................
    .................
  • .........................................
  • ACC 340 Week 3 Discussion Question 1
  • For more classes visit

www.snaptutorial.com
What are the advantages of a relational approach
to database design? What are the
drawbacks? ......................................
..................................................
............................. ....................
..................... ACC 340 Week 3 Discussion
Question 2 For more classes visit
www.snaptutorial.com
15
Does your firm use a DBMS? Can you tell us about
it? .............................................
..................................................
...................... ...........................
.............. ACC 340 Week 3 Team Database and
Reports For more classes visit
www.snaptutorial.com
Use your selected business activity from Week
2. Design at least two relational database
tables. Identify the primary keys and foreign
keys for your tables. Determine the reports you
would create to assist management evaluate and
monitor the business process. Identify the
relationships (using keys) that are needed to
create these reports. Click the Assignment Files
tab to submit your assignment. Note. Grades are
awarded based upon individual contributions to
the Learning Team assignment. Each Learning Team
member receives a grade based upon his/her
contributions to the team assignment. Not all
students may receive the same grade for the team
assignment. .....................................
..................................................
.............................. ...................
...................... ACC 340 Week 4 Connect
Knowledge Check For more classes visit
www.snaptutorial.com
16
1. Investments in business analytics systems
support the balanced scorecard management
process during the Link to Operations step.
True False 2. The process of using
sophisticated statistical techniques to extract
and analyze data from large databases to discern
patterns and trends that were not previously
known is called Data Warehouse Business
Intelligence Data Mining Data Mart 3.
Which of the following is not a value proposition
characteristic expected to influence customer
value? Product attributes Image Relationship
Innovation 4.
17
Since both are regulators, the SEC and the IRS
will likely have similar XBRL style sheets for
the various XBRL filings. True False 5.
XBRL GL (also known as XBRL Global Ledger
Taxonomy) serves as a means to facilitate
efficient communication within a firm. True
False 6.
Network IT changes the way that work if performed
and decisions are made. True False 7.
Which of the following is not a step in the
balanced scorecard management process? Adapt Inve
st Monitor Translate
18
8.
In February 2009, the passed the rule requiring
all large domestic firms to begin formatting
their financial statements using XBRL. Financial
Accounting Standards Board American Institute of
Certified Public Accountants International
Accounting Standards Board Securities and
Exchange Commission 9.
XBRL assurance is generally expected to
include The most current, standardized XBRL
taxonomy is used. The underlying financial and
nonfinancial data that is used in XBRL tagging
is reliable. The XBRL tagging is accurate and
complete. The reports include all relevant
financial and nonfinancial information. 10.
Which of the following is the best description of
the Link to Operations step in the balanced
scorecard management process? The company
examines the competitive environment. The company
establishes objectives, measures, targets, and
initiatives. The company prepares operating
budgets and prioritizes business process
improvements. The company evaluates the
effectiveness of its strategy.
19
..................................................
..................................................
................. ................................
......... ACC 340 Week 4 Discussion Question
1 For more classes visit
www.snaptutorial.com
What are the steps in the SDLC? Which is most
important? What are the ramifications of
skipping one of these steps? .....................
..................................................
.............................................. ...
...................................... ACC 340
Week 4 Discussion Question 2 For more classes
visit
www.snaptutorial.com
What is your personal involvement in determining
IS requirements? .................................
..................................................
.................................. ...............
.......................... ACC 340 Week 4
Textbook Assignment Ch 13 Problem 1 and 2
20
For more classes visit
www.snaptutorial.com
  • Write a response of no more than 1,050 words to
    Problems 1 and 2 from Ch. 13, "The Balanced
    Scorecard and Business Value of Information
    Technology" on pp. 272 of Accounting Information
    Systems.
  • Click the Assignment Files tab to submit your
    assignment.
  • Select a prominent public company, such as Apple,
    Google, or Microsoft. Obtain recent annual
    reports and news articles about the company.
    Using that information, develop a strategy map
    that describes the companys performance. Start
    by defining its value proposition, and then
    identifying key business processes that deliver
    that value proposition.
  • Use the company that you selected for Problem 1.
    Identify examples of its learning and growth
    efforts and explain how those might affect its
    business process performance.
  • ..................................................
    ..................................................
    .................
  • .........................................
  • ACC 340 Week 5 Computer Fraud Paper
  • For more classes visit

www.snaptutorial.com
Prepare a 700- to 1,050-word article summary
about a recent data breach or computer fraud at
an organization to include the following
21
  • Describe the circumstances involved and the
    results of the event.
  • Explain how the data breach occurred and what
    could have been done to prevent the breach/fraud
    from occurring.
  • Discuss what the organization has done or is
    doing to prevent the breach/fraud from occurring
    in the future.
  • Discuss the impact of the breach/fraud on the
    organization.
  • Discuss whether you believe that most incidents
    of data breaches and fraud are reported to the
    public. Why or why not?
  • Click the Assignment Files tab to submit your
    assignment.
  • ..................................................
    ..................................................
    .................
  • .........................................
  • ACC 340 Week 5 Discussion Question 1
  • For more classes visit

www.snaptutorial.com
What is the difference between a general control
and an application control? ....................
..................................................
............................................... ..
....................................... ACC 340
Week 5 Discussion Question 2 For more classes
visit
www.snaptutorial.com
22
What internal controls can be implemented using
information systems to safeguard your
organizations electronic assets? ...............
..................................................
..................................................
.. ......................................... ACC
340 Week 5 Individual Assignment Final Exam For
more classes visit
www.snaptutorial.com
  • Multiple-Choice Questions
  • 1. The process by which a financial transaction
    is recorded so that its flow through the system
    can be followed is called
  • Financial shadowing
  • Managerial trace technique
  • Concatenation
  • Audit trail
  • 2. Justifying expenditures for new technologies
    is especially difficult because
  • You do not know how many jobs will be affected
  • Expenses are often recurring and are difficult to
    estimate
  • Many benefits are intangible and are not easily
    known or measured
  • Justifying a new technology is no different from
    any other capital budgeting problem

23
  • 3. The essential steps in performing a systems
    study are (in order of occurrence)
  • Analysis, design, implementation and initial
    operation, follow up
  • Design, planning, follow up, analysis, and
    implementation
  • Planning, system specification, analysis,
    production, implementation
  • Planning, analysis, design, implementation, and
    follow up
  • 4. What is the first step to be performed by most
    organizations in their accounting cycles?
  • Recording business transactions in a journal
  • Preparing a trial balance
  • Recording closing entries in a journal
  • Preparing transaction source documents
  • none of the above
  • 5. Which systems study step is normally performed
    first?
  • Design
  • Initial operation
  • Follow up
  • Analysis
  • none of the above

24
  • It can disseminate information corporate wide
  • It can be accessed by selected trading partners
  • Users can employ common web browsers to access
    information in them
  • all of the above
  • 9. Another name for an Internet domain address is
    its
  • URL
  • ISP
  • email address
  • IETF
  • 10. Business process reengineering efforts
    sometimes fail because
  • Management gets too involved in the process
  • Management is too optimistic regarding its
    expectations from its implementation
  • Management support can never overcome employee
  • resistance
  • Employees will never accept change
  • 11. The sales process begins with

25
  • The cash forecast
  • Aged accounts receivable information
  • A receiving report
  • 14. Which of the following is not an example of a
    source document?
  • Receiving report
  • Purchase order
  • Sales order
  • Aging report
  • 15. Inputs to transaction processing systems
  • Are always in hard copy
  • Are best when input in a graphical format
  • May be in an electronic format when an EDI system
    is used
  • May never be audio
  • 16.Integrated accounting software programs
    generally include all of the following, except
  • Graphic reporting capabilities
  • Internet connectivity

26
  • Include technical training only
  • Do not include the design of user interfaces
  • 19. Which of the following software packages is
    not an example of a middle-range AIS?
  • Great Plains Dynamics
  • MAS 90
  • SAP R/3
  • Solomon
  • 20. Many organizations purchased new AISs during
    the 1990s
  • Because of the need for Year 2000 compliance
  • Because they wanted Internet connectivity
  • In order to take advantage of opportunities for
    reengineering
  • all of the above
Write a Comment
User Comments (0)
About PowerShow.com