Documente Academic
Documente Profesional
Documente Cultură
RN
1.0 Processing
Bit – 0 or 1
Byte – a group of 8 bits; it represents a character, digit or other values
Kilobyte (KB) – is about 1,000 bytes (more precisely, 1024 bytes)
Megabyte (MB) – is about 1 million bytes (more precisely, 1024 kb)
Gigabyte (GB) – is about 1 billion bytes (more precisely, 1024 mb)
Terabytes (TB) – is about 1 trillion bytes (actually, 1,009,511,.627,776
bytes)
1.2. The PROCESSOR, main memory, and registers
1.2.1 The processor, often called the central processing unit (CPU) – the “brain” of
the computer – consists of the control unit and the arithmetic/logic unit (ALU).
The processor works with the main memory (RAM) and registers to turn data
into information.
1.2.2 The Processor: In charge
Control unit tells the rest of the computer system how to carry out a
program’s instructions. It directs the movement of electronic signals
between main memory and the ALU, and between main memory and the
input and output devices.
ALU performs arithmetic operations and logical operations and controls
the speed of the operations.
A chip, or microchip, is a tiny piece of silicon that contains thousands of
micro-miniature electronic circuit components, mainly transistors. A
transistor is an electronic “gate”, or switch, that opens and closes to
transmit or stop electrical current. It can alternate between “on” and “off”
million of times per second.
1.2.3 The chip is mounted on a carrier with metal leads, or pens, on the system
board.
Examples of main processors are:
CISC (Complex Instruction Set Computer) - found in conventional IBM-
type microcomputer
RISC (Reduced Instruction Set Computer) - used by Macintosh and
many workstations.
MPP (Massive Parallel Processing) - executes more than one
instructions at a time (parallel), used by supercomputers.
RAM (Random Access Memory), a main memory, is a working storage. Its
contents are temporary and it varies for different computers.
Main memory is contained on chips called RAM chips that use CMOS
(Complementary Metal-Oxide Semiconductor) technology.
Memory chips are grouped on single-in-line memory modules (SIMMS) –
small circuit boards inserted into slots inside the computer and connected
to the processor by a bus.
40
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
Registers are high-speed circuitry areas that temporarily store data during
processing and provide working areas for computation. Examples are
instruction register, address register, and program register.
The machine cycle comprises a series of operations performed to execute
a single program instruction. The machine cycle consists of two parts: and
instruction cycle, which fetches and decodes, and an execution cycle,
which executes and stores.
41
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
3.0 Software
45
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
3.5.10 Groupware – a software used on a network and serves a group of users working
together on the same project. The four types of groupware are: basic
groupware, workflow software, meeting software, and scheduling software.
3.5.11 Desktop accessories and PIMs (Personal Information Managers)
3.5.12 Integrated software and software suites - integrated software packages
combine the features of several applications programs into one software
package. Software suites, or suites, are applications that are bundled together
and sold for a fraction of what the programs would cost if brought individually.
Web browsers – World Wide Web, or Web, consists of hundreds of
thousands of intricately interlinked sites called home pages set up for on-
screen viewing in the form of colorful magazine-style “pages” with text,
images, and sound.
A Web browser is software that enables you to “browse through” and view
Web sites. You can move from page to page by clicking on or selecting a
hyperlink – either underlined text or a graphic – or by typing in the address
of the destination page. Browsers are offered by Internet access providers
such as American Online, CompuServe, and Prodigy. The recent battle
royal to find the “killer app” is between Netscape’s Navigator and
Communicator and Microsoft’s Microsoft Explorer.
3.5.13 Desktop-publishing software – mixing text and graphics to produce high quality
printed output for commercial printing. Examples are QuarkXpress,
PageMaker, Microsoft’s Publisher, and Adobe Illustrator, CorelDraw, and
Adobe PhotoShop.
3.5.14 Project management software – used to plan, schedule, and control resources
– people, costs, and equipment – required to complete project on time.
Examples are Harvard Project Manager, Microsoft’s Project for Windows,
Project Scheduler, Super Project, and Time Line.
3.5.15 Computer-Aided Design (CAD) – software programs for the design of products
and structures. Examples are Autosketch, CorelCAD, EasyCAD2, TurboCAD
program and Parametric.
3.5.16 CAD/CAM (Computer-Aided-Manufacturing) – allows CAD product design to be
an input into an automated manufacturing system that makes the product.
3.5.17 Drawing and Painting software – graphics software that allows users to design
and illustrate objects and products, and to simulate painting on screen.
3.5.18 Hypertext and web site management
3.5.19 Multimedia authoring software – combines not only text and graphics but
animation, video, voice, and sound effects as well.
3.6 Software Issues
3.6.1 Public domain software – software that is not protected by copyright and thus
may be duplicated by anyone at will.
46
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
3.6.2 Freeware – a software that is available free of charge, distributed through the
internet or users groups.
3.6.3 Shareware – Copyrighted software that is distributed free of charge but
requires users to make a contribution in order to receive technical help,
documentation, or upgrades.
3.6.4 Proprietary software – software whose rights are owned by individual or
business, usually a software developer.
47
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
Data and meta-data. Meta data shows the origin of the data, the
transformation it has undergone, and summary of information about it,
which makes it more useful than the unintegrated, unsummarized data.
The data warehouse, a special database of cleaned up data and meta-data.
Small data warehouses may hold 100 gigabytes of less. Once 500 gigabytes
are reached, massively parallel processing (MPP) computers are needed.
4.6.4 Siftware for finding and analyzing
Software, or siftware tools, used to perform data mining are: query-and-
reporting tools, multidimensional analysis (MDA) tools and intelligent
agents.
52
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
6.1.5 Systems implementation – data, people, and procedures are converted from
the old system to the new; final documentation is compiled; users are trained;
the new system is out into operation.
6.1.6 Systems maintenance – the information system must be maintained, repaired,
and enhanced by analysts and maintenance programmers until it is suspected
to be obsolete. Then the SLDC begins again for a new system.
6.2 The First Phase: Preliminary investigation
6.2.1 A systems analyst conducts a preliminary analysis, determining the
organizations objectives and the nature and scope of the problems. The analyst
then proposes some possible solutions, comparing costs and benefits. Finally,
he or she submits a preliminary plan to top management.
6.2.2 This phase is often called a feasibility study.
6.2.3 Systems analyst may use JAD (joint application development) where systems
owners, users, analysts, and designers are brought together in highly organized
intensive workshops to jointly define and design systems (focus group
discussions). This is done to replace months of traditional interviews and
follow-up meetings.
6.2.4 The usual steps in preliminary investigation are:
Conduct preliminary study
Determine the organization’s objectives.
Determine the nature and scope of the problems.
Propose alternative solutions
Leave the system as is.
Improve the system
Develop a new system.
Describe costs and benefits
Submit a preliminary plan.
6.3 The Second Phase: Systems analysis
6.3.1 Systems analysis describes WHAT a system should do to meet the needs of
users.
6.3.2 Its objective is to gather data, analyze the data, and write a report. In general,
it involves a detailed study of
the information needs of the organization and all users.
the activities, resources, and products of any present information
systems.
the information systems capabilities required to meet the
established information needs and the user needs.
6.3.3 The usual steps in systems analysis are:
Gather data
Written documents.
53
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
Steps Activities
Step 1 – Problem 1. Specify program objectives and program users.
2. Specify output requirements.
3. Specify input requirements.
4. Study feasibility of implementing program.
5. Document the analysis.
57
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
58
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
59
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
61
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
62
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
7.5.3 Once the object becomes a part of a program, the processing instructions may
or may not be activated. This happens only when a “message is sent.” A
message is an alert sent to the object when operations involving that object
need to be performed.
7.5.4 A written program code (say, one that computes overtime pay) may be reused
in any number of programs. Thus, unlike with traditional programming, with
OOP you do not have to start from the scratch – that is, reinvent the wheel –
each time. This speed up programming time and lowering costs.
7.5.5 In procedural languages, a programmer develops all the programs. Under the
OOP model, we will have reusable objects that can be purchased and simply
plugged in or customized to fit virtually every need.
7.5.6 The three important concepts of OOP are:
Encapsulation. It means an object contains (1) data and (2) the
instructions for processing it.
Inheritance. It is the method of passing down traits of an object from one
program to another. Once an object is created, you can use it as the
foundation of similar objects that have the same behavior and
characteristics. A program could be mix with another program having the
same traits.
Polymorphism. It means “many shapes” in OOP. Polymorphism means
that a message (generalized request) produces different results based on
the object that is sent to. Example, a screen cursor may change its shape
depending on the program.
Some examples of OOP languages are Smalltalk, C++, and Hypertalk.
Distributed Object, Technology (DOT). It happens when an object
communicates across network. Without distribution, objects are
reusable only within the context of a given PL. In distributed object
system, objects that support important parts of a business are
centralized on network application servers, making it relatively easy
to implement changes that will ripple across many applications. Also,
DOT would make every computer system in the world compatible
with every other computer. The internet is perfectly suited to this
vision.
7.6 Visual Programming
7.5.1 OOP - graphical or visual way (icon) = Visual programming.
7.5.2 It is a method of creating programs by using icons that represents common
programming routines.
7.5.3 The programmer makes connections between objects by drawing, pointing and
clicking on diagrams and icons and by interacting with flowcharts.
63
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
7.5.4 For example, Visual BASIC offers another visual environment for program
construction for Windows applications, allowing you to build various
components using buttons, scroll bars, and menus.
7.7 HTML, VRML, and Java
7.7.1 These PLs are used to build multimedia on the World Wide Web.
7.7.2 HTML (Hypertext Markup Language) is a type of code that embeds simple
commands within standard ASCII text documents to provide an integrated,
two-dimensional display of text and graphics. A document created in any word
processor and stored in ASCII format can become a Web page with the addition
of few HTML commands. HTML has the ability to insert hypertext links that
enables you to display another Web document on the current screen. Various
HTMLs offer menu options to create your own Web page such as Adobe’s
PageMill, Soft Quad’s Ho Metal Pro, Microsoft’s FrontPage Editor and Internet
Explores, and Netscape.
7.7.3 VRML (Virtual Reality Markup Language) is a type of programming language
used to create three-dimensional (3D) Web pages. VRML is an extension of
HTML; thus, HTML Web browsers cannot interpret it. You need to plug-in to
VRML browser (for example, Netscape’s Live3D) to receive VRML Web pages.
7.7.4 Java allows programming to build applications that run on any kind of operating
system. The use of Java transforms the Web from an information-delivering
medium into a completely interactive computing environment. You may now
treat the Web as a giant hard disk loaded with a never-ending supply of
software applications. Java is a major departure from the HTML coding that
makes up most Web page. It is an interpreted programming environment, and
language is object-oriented and comparable to C++.
7.8 With the new developments in PLs, programming stages overlap and repeatedly flow
through analysis, design, coding and testing stages. Users can now test out new parts of
programs and even entire programs as they go along. They need not wait until the end
of the process to find out if what they said they wanted is what they really wanted.
8.2.1 Two types of signals are : analog signals and digital signals.
8.2.2 Analog signal ( continuous waves):
Telephones, radio, and television were designed to work with an analog
signal.
Analog signal is a continuous electrical signal in the form of a wave called
a carrier wave.
Two carrier waves that can be altered are frequency and amplitude.
Frequency is the number of times a wave repeats during a specific
time interval – that is, how many times it completes a cycle in a
second.
Amplitude is the height of a wave within a given period of time.
Amplitude is actually the strength or volume – the loudness – of a
signal.
8.2.3 Digital signals (discrete bursts)
Digital signal uses on/off or present/absent electrical pulses in
discontinuous, or discrete bursts, rather than a continuous waves.
This two-state kind of signal represents the two-state binary language of
0s and 1s that computer use. That is, 1 represents the presence of
electrical impulse and 0 the absence of it.
In 1880s, Samuel Morse developed the Morse code, which on paper
consisted of a series of dots and dashes. Thus, the letter V, for example,
consisted of three dots and a dash (…_). However, the actual transmission
of this character via telegraph wires and telegraphing equipment consisted
of three short signals (“taps”) and one long signal each signal being
separated by a pause.
Digital signals are better, faster and more accurate at transmitting
computer data
8.2.4 The Modem: The Great Translator
The present telecommunications backbone is analog. To use these
telecommunication infrastructure, we have to convert digital signals
(messages) to analog signals and back to digital signals again.
Modem, short for module/demodulator, converts digital signals into
analog form (a process known as modulation) to send over phone lines. A
receiving modem at the other end of the phone line then converts the
analog signal back to a digital signal (demodulator)
Modem does not change the wave form (analog or digital) rather it
changes the form of the wave. For example, the frequency might be
changed or the amplitude might be changed.
Modems are either internal or external.
Modem transmission speeds are expressed in bps (bits per second) or kbps
(kilobits per second).
65
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
Modem transmission speed are 1200, 2400, and 4800 bps (slow), 9600 and
14,400 bps (moderately fast), and 28,800, 33,600, and 56,000 bps (high-
speed, 56,000 bps equals 56kbps).
8.3 Communications software
8.3.1 Communication software manages the transmission of data between
computers.
8.3.2 Examples are: Smartcom, Crosstalk, Wincom, CommWorks, Telix, Procomm,
Plus, and HyperTerminal.
8.3.3 Some of the features of modem are:
Error correction – errors in data transmission are called “noise”, which may
garble high-speed data transmission; some modem have error-correction
features.
Data compression – it reduces the volume of data in a message, thereby
reducing the amount of time required to send data from one modem to
another.
Remote control – allows you to control a microcomputer from another
micro in a different location. Useful for travelers and technicians.
Examples of remote-control software for microcomputers are Carbon
Copy, Commune, Norton PC Anywhere, and Timbuktu/Remote.
Terminal evaluation – Mainframes and mini computers are designed to be
accessed by terminals, not by microcomputers which have a different
operating systems. Terminal emulation software allows you to use micros
to simulate a mainframe or minicomputer terminal. Windows 95 and its
latest versions include terminal emulation software.
ISDN, Cable Modems, ADSL, and Dishes: Faster, faster….
ISDN (Integrated Services Digital Network) lines are up to five times
faster than conventional phone modems. It is capable of transmitting
digital signal over traditional copper-wire telephone lines up to 128
kbps.
Cable modems can carry more than 1000 times faster than plain old
telephone system (POTS) lines with speed of 30-43 Mbps. A cable modem
connects a personal computer to a cable-TV system that offers online
services.
ADSL (Asymmetric Digital Subscriber Line) uses 1.5 Mbps using regular
phone lines. It can send 25% more data each second than one diskette can
hold.
Dishes. Satellite dishes, such as Hughes Network Systems’ 36-inch satellite
dish called the Convergence Antenna, transmit 15 times faster than a
standard high-speed modem, where connection to the Internet is not
done through telephone lines but through Hughes’ satellite Internet
service, called Direct PC.
66
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
bandwidth, slow (16-100 Mbps), and does not protect well against electrical
interferences. It is still used to connect parts of a LAN over short distances.
8.4.5 Coaxial cable consists of insulated copper wire wrapped in a solid or braided
metal shield, then in an external cover. Co-ax is widely used in cable TV and to
connect LAN over longer distances. It has greater bandwidth and is faster (up
to 200 Mbps) than twisted-pair wire.
Fiber–optic cable consists of hundreds or thousands of thin strands of glass
that transmit not electricity but rather pulsating beams of light. A fiber–
optic strands in a cable 0.12 inch thick can support a quarter to a half–
million voice conversations at the same time. Fiber–optic cables are
lighter, more durable, have lower error rates and not affected by random
electromagnetic interferences in the environment.
8.4.6 Microwave systems transmit voice and data through the atmosphere as high–
frequency radio waves. Microwaves are the electromagnetic waves that
vibrate at 1 gigahertz per second or higher. These frequencies are used not
only to operate ovens but also to transmit messages between ground-based
earth and satellite communications systems. A string of microwave relay
stations will each receive incoming messages, boost the signal strength, and
relay the signals to the next station.
8.4.7 Satellite systems, or communication satellites, are microwaving relay stations
in orbit around the earth, traditionally 22,300 miles above the earth, although
newer systems are much lower. The satellites travel at the same speed as the
earth. The orbiting satellite has solar – powered receivers and transmitters
(transponders) that receive the signals, amplify them, and retransmit them to
another earth station.
8.4.8 GPS (Global Positioning System) – a $10 billion infrastructure developed by the
military transmit timed radio signals than can be used to identify earth
locations.
8.4.9 One-way communications – pagers.
8.4.10 Two–way communication – analog cellular phones are designed primarily for
communicating at 824-894 MHz by voice through a system of ground–area
cells. Each cell is served by a transmitter – receiving tower. Cells are directed
between cells by a mobile telephone switching office (MTSO).
8.4.11 Two–way communications–packet–radio–based communications use a
nationwide system or radio towers that send data to handheld computers. The
wireless computer identifies itself to the local base station ,which can transmit
over as many as 16 separable radio channels.
8.4.12 Two–way communications–CDPD (Cellular Digital Packet Data) places
messages in packets, or digital electronic “envelopes”, and sends them through
underused radio channels or between passes in cellular phone conversations.
68
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
69
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
71
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.O1320.Computer Information Systems.RN
72
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
2. In a manual system, records of current activity are posted from a journal to a ledger. In a
computer system, current records from a (n)
A. Transaction file are updated to a master file.
B. Index file are updated to a master file.
C. Master file are updated to a year-to-date file.
D. Current balance file are updated to an index file. (rpcpa)
4. In an integrated computerized system, the following modules are logically linked with the
purchasing module except
A. Personnel database and compensating administrative modules.
B. Accounts payable, cash disbursement and bank reconciliation modules.
C. General ledger and fixed assets and modules.
D. Inventory and production and planning modules. (rpcpa)
5. The general ledger system is considered the “hub” of all the systems because
A. All the other system capture their data through the general ledger system.
73
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
B. The general ledger system is the central system that provides all the vital reports to
management and other interested parties.
C. All the other system use the same documents and forms as the general ledger system.
D. All the other system produce output that become inputs to the general ledger system.
(rpcpa)
6. To control purchasing and accounts payable, an information system must include certain
source documents. For a manufacturing concern like Fruit Processors Inc. these documents
should include
A. Purchase requisitions, purchase orders, receiving reports, and suppliers invoices.
B. Purchase orders, receiving reports, and inventory reports of goods needed.
C. Purchase requisitions, purchase orders, inventory reports of goods needed, and
suppliers invoices.
D. Purchase orders, receiving reports, and suppliers invoices. (rpcpa)
8. Which of the following shows a logical diagram of the flow of data through all parts of the
data processing system?
A. Document flow chart.
B. Program flow chart.
C. Systems flow chart.
D. Activity flow chart. (rpcpa)
9. Workbench Corporation operates in several regions, with each region performing its data
processing in a region data center. The corporate Management Information System (MIS)
staff has developed a database management system to handle customer service billing. The
director of MIS recommended that the new system be implemented in Region 4 to ascertain
if the system operates in satisfactory manner. This type of conversion is called a
A. Crash conversion.
B. Pilot conversion.
C. Parallel conversion.
D. Direct conversion. (rpcpa)
10. The process of developing specifications of hardware, software, manpower, data resources,
and information products required to develop a system is referred to as
A. Systems design . 74
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
B. System implementation.
C. System analysis.
D. System feasibility study. (rpcpa)
11. Systems analysts are fundamentally responsible for the development of an organization’s
information system. Which of the following is/are the least likely function to be performed
by the system analyst?
A. Examining user information requirements
B. Developing, coding and testing computer programs
C. Design of computer application
D. Developing systems flowchart (rpcpa)
12. All of the following are included in the systems implementing process EXCEPT
A. Training.
C. Testing.
B. Documentation.
D. Systems design. (rpcpa)
14. Ordinarily, the analysis tool for the systems analyst and steering committee to sue in selecting
the best system alternative is
A. Pilot testing.
B. User selection.
C. Decision tree analysis.
D. Cost-benefit analysis.
15. In determining the need for system changes, several types of feasibility studies can be made.
The most commonly recognized feasibility studies are
A. Legal, environmental, and economic.
B. Environmental, operational, and economic.
C. Technical, economic, legal, and practical.
D. Technical, operational, and economic.
16. Two phases of systems planning are project definition and project initiation. All of the
following are steps in project initiation phase except
A. Preparing the project proposal.
B. Informing managers and employees of the project.
C. Assembling the project team. 75
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
18. Systems analysts are the personnel within an organization who are responsible for the
development of the company’s information system. Which one of the following functions is
least likely to be performed by a system analyst?
A. Design of computer applications.
B. Preparation of specifications for computer-programming.
C. Developing, coding, and testing computer programs.
D. Examining user information requirements.
19. The least risky strategy for converting from a manual to a computerized accounts receivable
system would be a
A. Direct conversion.
B. Parallel conversion.
C. Pilot conversion.
D. Database conversion.
20. Workwell Company operates in several regions, with each region performing its data
processing in a regional data center. The corporate management information systems (MIS)
staff has developed a database management system to handle customer service and billing.
The director of MIS recommended that the new system be implemented in the Southwestern
Region to ascertain of the system operates in a satisfactory manner. This type of conversion
is called
A. Parallel conversion.
B. Direct conversion.
C. Prototype conversion.
D. Pilot conversion.
21. The graphic portrayal of the flow of data and the information processing of a system,
including computer hardware, is best displayed in a
A. Data-flow diagram.
B. System flowchart.
C. Gantt chart.
D. Decision tables.
B. Conceptual design.
C. Analysis.
D. Implementation.
23. The process of monitoring, evaluating, and modifying a system as needed is referred to as
A. Systems analysis.
B. Systems feasibility study.
C. Systems maintenance.
D. Systems implementation.
24. The process of learning how the current system functions, determining the needs of users,
and developing the logical requirements of a proposed system is referred to as
A. Systems maintenance.
B. Systems analysis.
C. Systems feasibility study.
D. Systems design.
25. The process of developing specifications for hardware, software, manpower, data resources,
and information products required to develop a system is referred to as
A. Systems analysis.
B. Systems feasibility study.
C. Systems maintenance.
D. Systems design.
26. An information system (IS) project manager is currently in the process of adding a system
analyst to the IS staff. The new systems analyst will be involved with testing the new
computerized system. At which stage of the systems development life cycle will the analyst
be primarily used?
A. Cost-benefit analysis.
B. Requirements definition.
C. Flowcharting.
D. Implementation.
27. Which one of the following is not considered a typical risk associated with outsourcing the
practice of hiring an outside company to handle all or part of the data processing?
A. Inflexibility.
B. Loss of control.
C. Loss of confidentiality.
D. Less availability of expertise
28. The advent of computers has far reaching impact on the accountancy profession. Whenever
considered, computerized demands extreme care to avoid the “horror stories” that may have
experienced. Among the critical areas for careful study are systems designs. Which of the
following is not related to system design?
77
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
31. Coding in data processing assigns a unique identification number or key to each data record.
Which one of the following statements about coding is incorrect?
A. A primary key in the main code used to store and locate records within a file.
B. Records can be sorted, and temporary files created, using codes other than their
primary keys.
C. Secondary keys are used when the primary keys cannot be found.
D. Secondary keys are used for alternative purposes including inverted files.
33. A commonly used measure of the relative frequency of adds, deletes, and changes to a master
file during a specified time period is
A. Volatility. 78
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
Systems Controls
34. Program documentation is a control designed primarily to ensure that
A. Programs are kept up to date and perform as intended.
B. Programs do not make mathematical errors.
C. Programmers have access to the tape library or information on disk files.
D. Data have been entered and processed.
(rpcpa)
35. The most critical aspect regarding separation of duties within information system is between
A. Programmers and systems analyst.
B. Project leaders and programmers.
C. Data control and file librarian.
D. Programmers and computer operators.
(rpcpa)
36. Preventive controls are an integral part of virtually all accounting processing systems, and
much of the information generated by the accounting system is used for preventive control
purposes. Which of the following is not an essential element of a sound preventive control
system?
A. Documentation of policies and procedures.
B. Sound personnel practices.
C. Separation of responsibilities for the recording, custodial and authorization functions.
D. Implementation of state-of-the-art software and hardware. (rpcpa)
37. Some of the more important controls that relate to automated accounting information
systems are validity checks, limit checks, and sign tests. these are classified as
A. Input validation routines.
B. Control total validation routines.
C. Data process validation routines.
D. Output controls. (rpcpa)
38. Feedback, feedforward, and preventive controls are important types of control systems and
procedures for accounting information systems. Which of the following is in the correct order
of feedback, feedforward, and preventive control systems?
A. Inventory control, capital budgeting, and cash budgeting.
B. Cost accounting, variances, separation of duties, and cash planning.
C. Cash budgeting, capital budgeting, hiring qualified employees.
D. Cost accounting variances, cash budgeting, and organizational independence.
(rpcpa) 79
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
40. Which of the following does not achieve systems control over source data?
A. Registration at point of entry.
B. Prevention of the nonprocessing of data.
C. Grouping with control totals.
D. Sequential numbering. (rpcpa)
41. Which of the following represents a lack of internal control in a computer based information
system?
A. Any and all changes in application programs have the authorization and approval of
management.
B. Provisions exist to protect data files from unauthorized access, modification, or
destruction
C. Both computer operators and programmers have unlimited access to the programs and
data files
D. Provisions exist to ensure the accuracy and integrity of computer processing of all files
and reports. (rpcpa)
42. An on-line access control that checks whether the user’s code number is authorized to initiate
a specific type of transactions or inquiry is called
A. Compatibility test.
B. Password.
C. Limit check.
D. Field check. (rpcpa)
43. An auditor used data to verify the existence of controls in a certain computer program. Even
though the program performed well on the test, the auditor may still have a concern that
A. Generalized audit software must have been a better tool to use.
B. Date entry procedures may change and render the test useless.
C. The text data will not be relevant in subsequent audit periods.
D. The program tested is the same one used in regular production runs. (rpcpa)
44. Which of the following is not an advantage of using computers during the audit process?
A. Auditor can work independently of the auditee.
B. Working papers can be reviewed from a off-site location, thus saving on travel costs.
C. Auditor has access to records of remote sites.
D. Auditors can alter client data, if desired. 80
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
46. In the organization of the information systems function, the most important separation of
duties is
A. Not allowing the data librarian to assist in data processing.
B. Assuming that those responsible for programming the system do not have access to
data processing operations.
C. Having a separate information officer at the top level of the organization outside of the
accounting function.
D. Using different programming personnel to maintain utility programs from those who
maintain the application programs.
47. A critical aspect of a disaster recovery program plan is to be able to regain operational
capability as soon as possible. In order to accomplish this, an organization can have an
arrangement with its computer hardware vendor to have a fully operational facility available
that is configured to the user’s specific needs. This is best known as a(n)
A. Uninterruptible power system.
B. Parallel system.
C. Cold site.
D. Hot site.
48. Most of today’s computer systems have hardware controls that are built in by the computer
manufacturer. Common hardware controls are
A. Duplicate circuitry, echo check, and internal header labels.
B. Data file protection, cryptographic protection and edit checks.
C. Duplicate circuitry, echo check, and dual reading.
D. Duplicate circuitry, echo check, tape file protection and internal header labels.
49. Online access controls are critical for the successful operation of today’s computer systems.
To assist in maintaining control over such access, many systems use tests that are maintained
through an internal access control matrix consisting of
A. Authorized user code numbers, passwords, lists of all files and programs, and a record
of the type of access each user is entitled to have to each file and program.
B. Authorized user code numbers and passwords.
C. A list of controls in the online system and list of those individuals authorized to change
and adjust those controls along with a complete list of files in the system.
D. A completeness test, closed loop verification, and a compatibility test.
81
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
50. To properly control access to accounting database files, the database administrator should
ensure that database system features are in place to permit
A. Read-only access to the database files.
B. Updating from privileged utilities.
C. Access only to authorized logical views.
D. User updates of their access profiles.
51. Data processed by a computer system are usually transferred to some form of output medium
for storage. However, the presence of computerized output does not, in and of itself, assure
the output’s accuracy, completeness, or authenticity. For the assurance, various controls are
needed. The major types of controls for this area include
A. Transaction controls, general controls, and printout controls.
B. Activity listings, echo checks, and prenumbered forms.
C. Tape of disk output controls and printed output controls.
D. Input controls, type and disk output controls on a printed output controls.
53. In order to prevent, detect, and correct errors and authorized tampering, a payroll system
should have adequate controls. The best set of controls for a payroll system includes
A. Batch and hash totals, record counts of each run, proper separation of duties,
passwords and user codes, and backup copies of activity and master files.
B. Employee supervision, batch totals, record counts of each run, and payments by check.
C. Passwords and user codes, batch totals, employee supervision, and record counts of
each run.
D. Batch totals, record counts, user codes, proper separation of duties, and online edit
checks.
54. An employee in the receiving department keyed in a shipment from a remote terminal and
inadvertently omitted the purchase order number. The best systems control to detect this
error would be
A. Batch total.
B. Completeness test
C. Sequence check.
D. Reasonableness test.
57. A company makes snapshot copies of some often-used data and makes them available in files
on the mainframes. Authorized users can then download data subsets into spreadsheet
programs. A risk associated with this means of providing data access is that
A. Data replicas may not be synchronized.
B. Data fragments may lack integrity.
C. Data transactions may be committed prematurely.
D. Data currency many be maintained.
60. Decision support systems in computerized environment have certain desirable characteristics
except
A. Flexible enough to accommodate a variety of management styles.
83
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
B. Supports decision-makers at all levels but is most effective at the tactical and strategic
levels.
C. Executed according to pre-established production schedule.
D. Is capable of interfacing with corporate database. (rpcpa)
61. This concept advocates that information is valuable resource and must therefore be managed
like other factors of production, manpower, materials and money. This is
A. Integrated information system.
B. Information resource management.
C. Systems audit.
D. Systems security management. (rpcpa)
62. A function-based information system is designed for the exclusive support of a specific
application area and its database and procedures are often independent of other systems.
Hence, certain data for an accounting system for instance, would be duplicated in an
inventory system. Data redundancy in such cases is expensive. The information system which
shares a common database, minimizes data redundancy and enhances interdepartmental
activity coordination is
A. Communication connectivity.
B. Wide area working.
C. Time-sharing system.
D. Integrated information system. (rpcpa)
63. An executive information system (EIS) focuses on long range objective and gives immediate
information about an organization’s critical success factors. It can be used on computers of
all sizes. It is normally used by executives at the highest organizations levels. All of the
following statements apply to EIS except
A. It is likely to be one of the most widely used and the large part of the information
subsystems in a business organization.
B. It provides top executives with immediate and easy access to information in a highly
interactive format.
C. It provides information in a highly aggregated form.
D. It helps executives monitor business combinations in general and assist in strategic
planning to control and operate the entity. (rpcpa)
64. Which of the following terms best describes a decision support system (DSS)?
A. Management reporting system.
B. Formalized system.
C. Interactive system.
D. Accounting information system.
66. Which one of the following statements about an executive information system (EIS) is
incorrect? The EIS
A. Provides top executives with immediate and easy access to information in a highly
interactive format.
B. Top executives monitor business conditions in general and assists in strategic planning
to control and operate the company.
C. Is designed to accept data from many different sources, to combine, integrate, and
summarize the data; and to display the data in a format that is easy to understand and
use.
D. Is likely to one of the most widely used and the largest of the information subsystems
in a business organization.
67. An executive information system (EIS) has all of the following characteristics except
A. Focusing on obtaining strategic objectives.
B. Giving immediate information about an organization’s critical success factors.
C. Providing information from nontraditional computer sources.
D. Providing advice and answers to top management from a knowledge-based system.
68. How is an accounting information system (AIS) distinguished from a management information
system (MIS)?
A. An AIS deals with financial information; MIS handles all other information.
B. An MIS may be either manual or computer based; an MIS is computer based.
C. An MIS is a subsystem within an MIS.
D. An AIS is control oriented; an MIS is used exclusively for planning.
69. An accounting information system (AIS) must include certain source documents in order to
control purchasing and accounts payable. For a manufacturing organization, the best set of
documents should include
A. Purchase requisitions, purchase orders, inventory record of goods needed, and vendor
invoices.
B. Purchase orders, receiving reports, and inventory reports of goods needed.
C. Purchase orders, receiving reports, and vendor invoices.
D. Purchase requisitions, purchase orders, receiving reports, and vendor invoices.
85
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
70. Which one of the following statements about an accounting information system (AIS) is
incorrect?
A. AIS supports day-to-day operations by collecting and sorting data about an
organization’s transactions.
B. The information produced by AIS is made available to all levels of management for use
in planning and controlling an organization’s activities.
C. AIS is best suited to solve problems where there is great uncertainty and ill-defined
reporting requirements.
D. AIS is often referred to as a transaction processing system.
71. Which one of the following features is least likely to apply to the transaction processing cycle
of an accounting information system?
A. Data records are chiefly historical in nature.
B. Most of the sources of data are an organization’s recurring transactions.
C. Data are usually financial in nature.
D. Data records are the basis of predictive systems.
72. Which one of the following technological elements of computer-based information systems
has the least effect in driving the changes that are currently occurring in the workplace?
A. Advances in microcomputer hardware and software.
B. Office automation and teleprocessing.
C. Decision support systems and artificial intelligence. (AI).
D. Advances in disaster recovery systems.
Networking
73. A network of computers located throughout an organization’s different facilities to fulfill
information processing needs is called:
A. Interactive processing.
B. On-line processing.
C. Local area network.
D. Distributed data processing. (rpcpa)
74. The technology that permits a computer in one company, an application examples of which
is computerized billings and payments among companies is
A. Transfer system method.
B. Electronic data interchange.
C. Integrated information systems.
D. Local area network. (rpcpa)
75. An example of this management information system is the airline reservation system where
all transactions are record as they occur to render the system continuously up-to-date
A. Network system. 86
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
77. What type of EDP system is characterized by data that are assembled from more than one
location and records that are updated immediately?
A. On-line real-time system.
B. Batch processing system.
C. Microcomputer system.
D. Minicomputer system. (rpcpa)
Computer Hardware
78. All of the following are computer input devices except a (an)
A. Plotter.
B. Magnetic ink character recognition device.
C. Mouse.
D. Light pen. (cma)
79. The input device used in a department store that allows a sales clerk to pass a light pen over
the price tag to record the purchase is a (an)
A. Mark-sense reader.
B. Touch-tone device.
C. Optical scanner.
D. Laser bar code scanner. (cma)
80. Banks are required to process many transactions from paper documents (e.g., checks, deposit
slips) during the course of an average business day. This requires a reliable, yet economical,
form of input. The most common source automation device used by banks is
A. A disk pack.
B. Bar coding.
C. Magnetic tape.
D. Magnetic ink character recognition. (cma)
81. Access time in relation to computer processing is the amount of time it takes to
A. Transmit data from a remote terminal to a central computer.
B. Complete a transaction from initial input to output.
C. Perform a computer instruction. 87
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
Computer Software
82. All of the following are examples of computer software except a (n)
A. Database management system.
B. Language translator.
C. Telephone modem.
D. Word processing package.
83. Microcomputer systems have enhanced use with systems software and applications
software. Which one of the following statements concerning microcomputer systems is false?
A. Database management systems are available for microcomputers.
B. An operating system program is a critical software for microcomputers.
C. Electronic spreadsheet package for microcomputers.
D. Integrated packages are examples of operating systems for microcomputers.
E.
84. All of the following are characteristics of computer machine language except.
A. Internal binary code.
B. Hexadecimal code.
C. Assembly language.
D. On/Off electrical switches.
85. Mainframe computer systems include several advanced processing procedures. Two of the
most common processing procedures are multiprocessing and multiprogramming. Which one
of the following statements about there processing procedures is false?
A. Multiprocessing usually involves two or more computers functioning simultaneously.
B. Multiprogramming allows multiprogramming to be executed at exactly the same time.
C. Multiprogramming switches back and forth between programs during processing.
D. Multiprocessing allows the sharing of a central memory during processing.
86. A software tool infrequently used to select or access items in the database is most likely a(n)
A. Report generator.
B. Program generator.
C. Application generator.
D. Query utility program.
87. A software tool used for ad hoc, online access to items in a database would most likely the
a(n)
A. Query utility program.
B. Application generator.
C. Report generator.
D. Terminal emulation software.
88
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
88. Computer manufacturers are now installing software programs permanently inside the
computer as part of the main memory to provide protection from erasure or loss if there is
interrupted electrical power. This concept is known as
A. File integrity.
B. Software control.
C. Firmware.
D. Random-access memory (RAM).
89. Which one of the following statements most accurately represents the basic steps in
designing spreadsheet model?
A. Define the problem, identify inputs and outputs, develop assumptions and on criteria,
and document formulas.
B. Identify inputs and outputs, develop assumptions and decision criteria, document
formulas, and build macros.
C. Define the problem, develop assumptions and decision criteria, develop test cases, and
build macros.
D. Develop assumptions and decision criteria, document formulas, develop test cases, and
run test cases.
90. A characteristics of microcomputer system that displays more than one program on the
screen at the same time, places such program in its own area of the screen, but permits only
one program to be active is
A. Windowing.
B. Distributed processing.
C. Context switching.
D. File extension.
Processing Modes
91. The time interval between the instant at which as instruction control unit initiates a call for
data and the instant at which delivery of the data is completed is:
A. Access time.
B. Compliance time.
C. Idle time.
D. Throughput time. (rpcpa)
92. In computer operations, data are encoded before processing, can be done by the computer.
These statements refer to batch processing except:
A. The processing of data collected in advance so that each accumulation is processed in
the same run.
B. The technique of executing a set of computer programs such that each completed before
the next program of the set is started.
C. The processing of related transactions that have been grouped together.
D. The method of using the computer system that allows a number of users to execute
programs currently and to interact with the programs during execution. (rpcpa) 89
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
93. A system with several computers that are connected for communication and data
transmission purpose, but were each computer can also process its own data, is known as a
A. Hybrid system.
B. Distributed data processing network.
C. Multitask network.
D. Decentralized and computer operators. (rrpcpa)
94. It is both a technological and an organizational concept based on the premise that
information systems can be made more responsive to users by placing computer hardware
and personnel physically close to the people who use them
A. Distributed data processing.
B. Close-ties computing.
C. Customer–oriented processing.
D. Departmental computing. (rpcpa)
95. A system that permits suppliers and buyers to have direct access to portions of each other’s
databases, including date, to enhance service and deliveries is
A. Cooperative processing.
B. Electronic data interchange.
C. Interactive processing.
D. Electronic mail. (rpcpa)
96. Batch processing
A. Is not used by most businesses because it reduces the audit risk.
B. Processes individual transactions as they occur.
C. Allows users to inquire about groups of information contained in the system.
D. Accumulates transaction records into groups for processing against the master file.
97. Transaction processing systems frequently support the inquiry of online database users.
Inquiry processing includes all of the following characteristics except that
A. Either batch or real-time processing may be used.
B. It is dependent on the use of telecommunication networks and database management
query languages.
C. Responses are in a prespecified format displayed on the end user’s terminal.
D. End-users are allowed to make changes to the records retrieval.
100. A system that has several minicomputers connected for communication and data
transmission purposes but also enables each computer to process its own data is known as
A. Distributed data processing network.
B. Centralized network.
C. Decentralized network.
D. Multidrop network.
101. In traditional information systems, computer operators are generally responsible for backing
u[p software and data files on a regular basis. In distributed or cooperative systems, ensuing
that adequate backups are taken is the responsibility of
A. User management.
B. Systems programmers.
C. Data entry clerks.
D. Tape libraries.
102. An insurance company is planning to implement new standard software in all its local offices.
The new software has a test response time, is very user friendly, and was developed with
extensive user environment. The new software captures, consolidates, edits, validates, and
finally transfers standardized transaction data to the headquarters mainframe. Local
managers, who were satisfied with existing locally written microcomputer applications,
opposed the new approach because they anticipated
A. Increased workloads.
B. Lengthy retraining.
C. More accountability.
D. Less computer equipment.
103. The system that permits the computers in a distributed processing network to share the use
of another and user’s application program is
A. Electronic data interchange.
B. Interactive processing.
C. Executive support system.
D. Cooperative processing.
104. Today organizations are using microcomputers for data presentation because microcomputer
use, compared with mainframe use, is more
A. Controllable.
B. Conductive to data integrity.
C. Reliable. 91
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
D. Cost effective.
Databases
105. All of the following are methods for distributing a relational database access multiple servers
except
A. Snapshot (making a copy of the database for distribution).
B. Replication (creating and maintaining replica copies at multiple locations).
C. Normalization (separating the database into logical tables for easier user processing).
D. Fragmentation (separating the database into parts and distributing where they are
needed).
106. In a database, there are often condition that constrain database records. For example, a sales
order cannot exist unless the corresponding customer exists. This kind of constraint is an
example of
A. Normalization.
B. Entity integrity.
C. Internal scheme.
D. Referential integrity.
107. In a database system, looking of data helps preserve data integrity by permitting transactions
to have control of all the data needed to complete the transactions. However, implementing
a looking procedure could lead to
A. Inconsistent processing.
B. Rollback failures.
C. Unrecoverable transactions.
D. Deadly embraces (retrieval contention).
109. A flat file structure is used in database management systems (DBMS) when
A. A company network structure is employed.
B. A network based structure is used and a complex database scheme is developed.
C. A simple network structure is employed.
D. A relational database model is selected for use.
92
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
110. The database approach to systems and the resulting concept of database management
systems have several unique characteristics not found on traditional systems, specifically file-
oriented systems. Which one of the following statements does not apply to database
oriented-systems?
A. Database systems have data independence; that is, the data and the programs are
maintained separately except during processing.
B. Database systems obtain a data definition language that helps describe each schema
and subschema.
C. The database administrator is the part of the software package that instructs the
operating aspects of the program when data are retrieved.
D. A primary goal of database systems is to minimize data redundancy.
111. The financial accounting database has several critical relationships that must be properly
maintained if the system is to function in an orderly manner. Which one of the following
statements about the financial accounting database is incorrect?
A. The general ledger is a master file in which a record is maintained for each and every
account in the organization’s accounting system.
B. Subsidiary ledgers are master files containing accounting records by specific account
categories.
C. Cash disbursements journals are complete records of each transaction that reduces
cash.
D. Transaction records include cross-references between general ledger files, subsidiary
account numbers, and source documents numbers.
112. In an overall description of database, the names of data elements, their characteristics, and
their relationship to each other are defined by using a
A. Data definition language.
B. Data control language.
C. Data manipulation language.
D. Data command interpreter language.
113. The increase used of data processing systems makes managing data and information a major
information service function. Because the databases of an organization are used for many
different applications, they are coordinated and controlled by a database administrator. The
functions of database administrator are:
A. Data input preparation, database design, and database operations.
B. Database design, database operation, database security.
C. Database design, database operation, and equipment operations.
D. Database design, software support, and database security.
116. Which of the following is likely to be a benefit of electronic data interchange (EDI)?
A. Increased transmission speed of actual documents.
B. Improved business relationships with trading partners.
C. Decreased liability related to protection of proprietary business data.
D. Decreased requirements for backup and contingency planning.
117. The emergence of electronic data interchange (EDI) as standard operating practice increases
the risk of
A. Unauthorized third-party access to systems.
B. Systematic programming errors.
C. Inadequate knowledge bases.
D. Unsuccessful systems use.
94
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
121. As organizations move to implement EDI, more of them are turning to the use of value-added
networks (VANs). Which of the following would not normally be performed by a VAN?
A. Store electronic purchase orders of one organization to be accessed by another
organization.
B. Provide common interfaces across organizations thereby eliminating the need for one
organization to establish direct computer communication with a trading partner.
C. Maintain a log of all transactions of an organization with its trading partner.
D. Provide transactions from client’s computer system.
122. In a review of an EDI application using a third-party service provided, the auditor should
i. Ensure encryption keys meet ISO standards.
ii. Determine whether an independent review of the service provider’s operation has
been conducted.
iii. Verify that only [public-switched data networks are used by the service provider.
iv. Verify that the service provider’s contracts include necessary clauses, such as the
right to audit.
A. I and II.
B. I and IV.
C. II and III.
D. II and IV.
123. After implementing EDI with suppliers, a company discovered a dramatic increase in prices it
paid the single suppler of some special materials for its primary product line. After consulting
with the supplier, the company determined that the supplier had assumed the risk of not
having inventory and raised its prices accordingly since the company was the only buyer for
the special materials. The best approach for managing inventory in this situation is for the
company to
A. Gave the supplier more information about expected use of the materials.
B. Demand that the supplier reduce the prices of the materials.
C. Hire another supplier to replace the one charging higher prices.
D. Change its product line so the special materials are no longer needed.
124. If the cycle time for manual purchase orders is 25 days, composed of 4 days of preparation, 3
days in the mail, 14 days in process at the supplier, and 4 days for delivery of raw materials,
the shortest possible cycle time if a company fully implemented EDI suppliers would be
A. 25 days.
B. 18 days.
C. 4 days.
D. 1 day.
125. Which of the following risks is not greater in an electronic fund transfer (EFT) environment
than in manual system using paper transactions? 95
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
126. Which of the following is a risk that is higher when an electronic funds transfer (EFT) system
is used?
A. Improper change control procedures.
B. Unauthorized access and activity.
C. Insufficient online edit checks.
D. Inadequate backups and disaster recovery procedures.
Artificial Intelligence
127. Expert systems consists of
A. Software packages with the ability to make judgment decisions.
B. A panel of outside consultants.
C. Hardware designed to make judgment decisions.
D. Hardware and software used to automate routine tasks.
128. Which one of the following incorporates making the best decisions possible, using a logical
approach in solving problems, using reasoning, having the capacity to learn, and allowing
subjective inputs and outputs?
A. Expert systems.
B. Decision support systems.
C. Multi-networking.
D. Neural networks.
129. Prudent managers will recognize the limits within which expert systems can be effectively
applied. An expert system would be most appropriate to
A. Compensate for the lack of certain technical knowledge within the organization.
B. Help make customer-service jobs easier to perform.
C. Automate daily managerial problem-solving.
D. Emulate human expertise for strategic planning.
131. A bank implemented an expert system to help account representatives consolidate the bank’s
relationships with each customer. The expert system has 96
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
132. For which of the following applications would the use of fuzzy logic system be the most
appropriate artificial intelligence (AI) choice?
A. Assigning airport gates to arriving airline flights.
B. Forecasting demand for spare auto parts.
C. Verifying expressway tunnels.
D. Diagnosing computer hardware problems.
135. An insurance firm uses a wide area network (WAN) to allow agents away from the home office
to obtain current rates and client information and to submit approved claims using notebook
computers and dial-in modems. In this situation, which of the following g methods provide
the best data?
A. Dedicated phone lines.
B. Call-back features.
C. Frequent changes of user Ids and passwords.
D. End-to-end data encryption.
136. An electronic meeting conducted between several parties of remote sites is referred to as.
A. Teleprocessing.
B. Interactive programming.
C. Telecommuting.
D. Teleconferencing.
97
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
137. Large organizations often have their own communication networks for transmitting and
receiving voice, data, and images. Very small organizations, however, are unlikely to be able
to make the investment required by their own networks and are more likely to use
A. Public switched lines.
B. Fast-packet switches.
C. Standard electronic mail systems.
D. The internet.
139. Management of a financial services company is considering strategic decisions concerning the
expansion of its existing local area network (LAN) to enhance the firm’s customer service
function. Which of the following aspects of the expanded system is the least significant
strategic issue for management?
A. How the expanded system can contribute to the firm’s long-range business plan.
B. How the expanded system would support daily business operations.
C. How indicators can be developed to measure how well the expanded system achieves
its business objectives.
D. How the expanded system will contribute to the reduction of operating costs.
140. If a system does not have a mainframe computer or a file server but does processing within
a series of microcomputers, the network is a(n)
A. Offline processing system.
B. Expert system.
C. Direct access system.
D. Peer-to-peer program.
141. Which one of the following is considered to be a server in a local area network (LAN)
A. The cabling that physically interconnects the nodes of the LAN.
B. A device that stores program and data files for users of the LAN.
C. A device that connects the LAN to other network.
D. A workstation that is dedicated to a single user on the LAN.
142. When connecting with two or more electronic mail systems, which of the following is a major
security issue?
A. Inability to encrypt messages going between network gateways. 98
www.certscollege.org uc cpa review www.reviewer-online.org
MAS.01320.Computer Information Systems.MC
143. A company has a very large, widely dispensed internal audit program. Management wants
to implement a computerized system to facilitate communications among auditors. The
specifications require that auditors have the ability to place messages in a central electronic
repository where all auditors can access them. The system should facilitate information on a
particular topic. Which type of system would best meet these specifications?
A. Electronic data interchange (EDI).
B. Electronic bulleted board system,
C. Fax/modem software.
D. Private branch exchange (PEX).
done
99
www.certscollege.org uc cpa review www.reviewer-online.org