AllFreePapers.com - All Free Papers and Essays for All Students
Search

Accounting Information System

Autor:   •  March 3, 2016  •  Exam  •  5,001 Words (21 Pages)  •  2,041 Views

Page 1 of 21

Multiple-Choice Questions

  1. Three objectives of a company's internal control system should be safeguarding assets, checking the accuracy and reliability of accounting data, and promoting operational efficiency.  A fourth objective of a company's internal control system should be:
  1. Preventing embezzlement of assets
  2. Encouraging adherence to prescribed managerial policies
  3. Avoiding the payment of overtime to company employees
  4. Revising standards for production costs on a weekly basis

  1. The control environment is a component of a company's internal control system that:
  1. Influences the control awareness of a company's employees
  2. Stresses the development of control procedures in a company
  3. Directly affects the accuracy and reliability of a company’s accounting data
  4. Can be ignored when establishing a company's internal control system
  1. The preventative controls within a company’s internal control system:
  1. Form the foundation for all of a company's other internal control components
  2. Focus on management’s philosophy and operating style
  3. Ignore the risk factor associated with a company's control procedures
  4. Relate to safeguarding a company's assets and checking the accuracy and reliability of the company's accounting data
  1. A general rule that should be followed when developing control procedures for a company's assets is:        
  1. The cost of the control procedure will likely exceed the procedure's benefit
  2. The procedure should not be designed and implemented unless an asset's cost exceeds $5,000
  3. The more liquid an asset is, the greater the risk of its misappropriation
  4. The procedure should not be designed and implemented in situations where a risk assessment has been previously performed
  1. Assume that a company designs and implements a control procedure whereby the accountant that is responsible for recording cash receipts transactions does not have access to the cash itself.  This control procedure is an example of a:
  1. Detective control
  2. Preventive control
  3. Corrective control
  4. Feedback control
  1. Control procedures that provide feedback to management regarding the achievement of operational efficiency and adherence to prescribed managerial policies are called:
  1. Corrective controls
  2. Preventive controls
  3. Policy controls
  4. Detective controls
  1. Those control procedures that are designed to remedy problems discovered through detective controls are called:
  1. Corrective controls
  2. Preventive controls
  3. Before-the-fact controls
  4. Management-by-exception controls
  1. The maintenance of backup copies of a company's important transaction and master files is an example of a:
  1. Preventive control procedure
  2. Detective control procedure
  3. Corrective control procedure
  4. Management-by-exception control procedure

  1. A control procedure that may be established within the sales department of a company's marketing subsystem is the addition of the sales invoice amounts before these invoices are sent to the information processing subsystem.  This control total of invoice amounts is called a:
  1. Checksum
  2. Random total check
  3. Redundant control amount
  4. Batch control total
  1. Which of the following statements is true regarding preventive control procedures and detective control procedures?
  1. They should be interrelated
  2. If preventive controls exist, detective controls are unnecessary
  3. If detective controls exist, preventive controls are unnecessary
  4. Preventive controls should be cost effective, but detective controls do not need to be cost effective
  1. Which of the following statements is true?
  1. The COSO report failed to define internal control
  2. The COSO report emphasized that an internal control system is a tool of management
  3. SAS 78 rejected the definition of internal control provided in the COSO report
  4. COBIT concluded that a company's management is not responsible for establishing and monitoring a company's internal control system
  1. Regarding the cost-benefit concept, which of the following statements is true?
  1. Every control procedure that offers benefits to a company should be implemented into the company's system
  2. An optimal internal control package is developed for a company's system by implementing a standardized package of control procedures
  3. A control procedure is considered cost effective if it can be determined that the cost of operating the procedure will be cheaper in the current period compared to the previous period
  4. A control procedure is considered cost effective when its anticipated benefits exceed its anticipated costs
  1. An ideal control is:
  1. A control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected
  2. A control procedure that is anticipated to have the lowest possible cost in relation to its benefits
  3. A control procedure that should always be implemented into a company's system due to the efficiency and effectiveness that will result from its implementation
  4. A control procedure that is always cost effective
  1. Due to data errors occurring from time to time in processing the Albert Company's payroll, the company's management is considering the addition of a data validation control procedure that is projected to reduce the risk of these data errors from 13% to 2%. The cost of the payroll reprocessing is estimated to be $11,000.  If the data validation control procedure is implemented, the cost of this procedure is expected to be $700 per pay period (employees are paid biweekly).  Based on the above data, which of the following statements is true?
  1. The data validation control procedure should be implemented because its net estimated benefit is $1,210
  2. The data validation control procedure should be implemented because its net estimated benefit is $510
  3. The data validation control procedure should not be implemented because the $700 expected cost per pay period exceeds the procedure's expected benefit
  4. The data validation control procedure should not be implemented because its net estimated benefit is a negative $1,210, thereby causing the control procedure to fail in terms of being cost effective
  1. Which of the following frameworks is widely used by managers to organize and evaluate their corporate governance structure?
  1. COBIT
  2. COSO
  3. NIST
  4. SAS No. 94
  1. Which of the following fundamental concepts is stressed by the COSO report?
  1. Internal control is not affected by people
  2. Internal control is geared to the achievement of a company's objectives in the financial reporting area only
  3. Internal control is designed to detect all errors and irregularities that occur within a company's system
  4. Internal control is a process
  1. A periodic review by internal auditors that stresses the evaluation of the efficiency and effectiveness of a department's procedures is called a (an):
  1. Operational audit
  2. Financial audit
  3. Management-by-exception audit
  4. Audit by exception

  1. Regarding the internal audit function, which of the following statements is true?
  1. Since many internal auditors have accounting backgrounds, the internal audit function should ideally be included within a company's accounting subsystem
  2. It is not proper for internal auditors to perform a fraud investigation within any part of their company's system
  3. Because of the independence of external auditors, they should never accept previous work of evaluating controls performed by a company's internal auditors
  4. Within a company's system, it is preferable to establish the internal audit function as a separate subsystem
  1. Regarding a company's audit trail, which of the following statements is true?
  1. Because of the complexities involved in establishing an audit trail, a good audit trail normally makes it more difficult for an individual to follow the flow of a company's business transactions through the company's information system
  2. In actuality, the audit trail established within a company's information system is an unimportant element of the company's internal control system
  3. When a company's audit trail becomes more difficult to follow, this causes an increase in the risk of errors or irregularities taking place in the processing of accounting transactions and not being detected
  4. A company's policies and procedures manual should not be part of its audit trail since confidential information is included within this manual
  1. An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to:
  1. Utilize polygraphs
  2. Acquire arbitrage loss protection
  3. Acquire fidelity bond coverage
  4. Institute punitive management
  1. If the same employee is responsible for authorizing a business transaction and recording the transaction in the accounting records, this indicates a weakness in which element of a company's internal control system?
  1. A good audit trail
  2. Separation of duties
  3. Internal review of controls
  4. Competent employees
  1. Which of the following control procedures provides physical protection for a company's cash asset?
  1. Majority of authorized cash disbursements made by check
  2. Daily cash receipts deposited intact at bank
  3. Voucher system for cash disbursements
  4. all of the above

  1. Which of the following statements is true regarding timely performance reports?
  1. In many companies, these reports are the major means of providing information to management concerning the actual operations of the companies’ internal control systems
  2. These reports should only include monetary data
  3. Since these reports fail to provide feedback to management on the operations of previously implemented internal control procedures, other techniques are needed to provide this feedback to managers
  4. The complexity that a computer introduces into a company's information system will typically prevent the preparation of timely performance reports for the company's management
  1. A responsibility that should be assigned to a specific employee and not shared jointly is that of:
  1. Access to the company's safe deposit box
  2. Placing orders and maintaining relationships with a prime supplier
  3. Attempting to collect a particular delinquent account
  4. Custodianship of the petty cash fund
  1. For control purposes, the quantities of materials ordered may be omitted from the copy of the purchase order which is:
  1. Forwarded to the accounting department
  2. Retained in the purchasing department's files
  3. Returned to the requisitioner
  4. Forwarded to the receiving department
  1. Freije Refrigeration Company has an inventory of raw materials and parts consisting of thousands of different items which are of small dollar value individually but significant in total.  A fundamental control requirement of Freije's inventory system is that:
  1. Perpetual inventory records be maintained for all inventory items
  2. The taking of physical inventories be conducted on a cycle basis rather than at year-end
  3. The storekeeping function not be combined with the production and inventory record-keeping functions
  4. Material requisitions be approved by an officer of the company

  1. The sales department bookkeeper has been crediting house-account sales to her brother-in-law, an outside salesman.  Commissions are paid on outside sales but not on house-account sales.  This might have been prevented by requiring that:
  1. Sales order forms be prenumbered and accounted for by the sales department bookkeeper
  2. Sales commission statements be supported by sales order forms and approved by the sales manager
  3. Aggregate sales entries be prepared by the general accounting department
  4. Disbursement vouchers for sales commissions be reviewed by the internal audit department and checked to sales commission statements

In each one of the following four questions (questions 50-53), you are given a well-recognized procedure of internal control.  You are to identify the irregularity that will be discovered or prevented by each procedure.

  1. The voucher system requires that invoices be compared with receiving reports and express bills before a voucher is prepared and approved for payment.
  1. Unrecorded checks appear in the bank statement
  2. The treasurer takes funds by preparing a fictitious voucher charging "Miscellaneous General Expenses"
  3. An employee in the purchasing department sends through fictitious invoices and receives payment
  4. A cash shortage is covered by underfooting outstanding checks on the bank reconciliation
  5. A cash shortage is covered by omitting some of the outstanding checks from the bank reconciliation

  1. Both cash and credit customers are educated to expect a sales ticket.  Tickets are serially numbered.  All numbers are accounted for daily.
  1. Customers complain that their monthly bills contain items that have been paid
  2. Some customers have the correct change for the merchandise purchased; they pay and do not wait for a sales ticket
  3. Customers complain that they are billed for goods they did not purchase
  4. Customers complain that goods ordered are not received
  5. Salesclerks destroy duplicate sales tickets for the amount of cash stolen

  1. At a movie-theater box office, all tickets are prenumbered.  At the end of each day, the beginning ticket number is subtracted from the ending number to give the number of tickets sold.  Cash is counted and compared with the number of tickets sold.
  1. The box office gives too much change
  2. The ticket taker admits his friends without a ticket
  3. The manager gives theater passes for personal expenses, which is against company policy
  4. A test check of customers entering the theater does not reconcile with ticket sales
  5. Tickets from a previous day are discovered in the ticket taker's stub box despite the fact that tickets are stamped "Good on Date of Purchase Only"
  1. The duties of cashier and accounts-receivable bookkeeper should be separated.
  1. There are two cashiers.  At the end of a certain day, there is a sizable cash shortage; each cashier blames the other and it is impossible to fix responsibility
  2. A cash shortage is covered by overfooting (overadding) cash in transit on the bank reconciliation
  3. A cash shortage is covered by charging it to "Miscellaneous General Expenses"
  4. Customers who paid their accounts in cash complain that they still receive statements of balances due
  5. The accounts-receivable bookkeeper charges off the accounts of friends to "Allowance for Uncollectible Accounts"
  1. The COSO report stresses that:
  1. Internal control is a process
  2. An internal control system, if properly designed, can become a substitute for management
  3. People only at high levels of an organization are an important part of an internal control system
  4. An internal control system should consist of three interrelated components: the control environment, risk assessment, and control activities
  1. Regarding COBIT, which of the statements is true?
  1. COBIT means Cost Objectives for Information and Related Technology
  2. COBIT rejects the definition of internal control from the COSO report
  3. COBIT states that a company’s management should play a minor role in establishing an internal control system
  4. COBIT classifies people as one of the primary resources managed by various IT processes
  1. The component of an internal control system that concerns itself with the way a company’s management assigns authority and responsibility is called:
  1. Monitoring
  2. Control environment
  3. Risk assessment
  4. Information
  1. _________________ describes the policies, plans, and procedures implemented by a firm to protect its assets.
  1. Internal control
  2. SAS No. 94
  3. SOX, Section 404
  4. Enterprise risk management

58.           The 1992 COSO report identifies five components for an effective internal control system.  These are:

a)        Control environment, risk assessment, control activities, information and communication, and monitoring

b)          Control environment, control procedures, control activities, communication, and monitoring  

...

Download as:   txt (25.9 Kb)   pdf (254.6 Kb)   docx (464.1 Kb)  
Continue for 20 more pages »