1 / 26

ACC 340 Extraordinary Success |snaptutorial.com

For more classes visit<br>www.snaptutorial.com<br><br> <br>ACC 306 Week 1 Assignment E13-21, E13-22, P12-1, P12-7,P12-10, P12-14, P13-6<br>ACC 306 Week 1 Quiz<br>ACC 306 Week 1 DQ 1 Equity Method<br>ACC 306 Week 1 DQ 1 Accounting Pronouncements<br> <br>ACC 306 Week 1 DQ 2 Judgment Case 13-9<br>ACC 306 Week 2 Quiz<br>

Download Presentation

ACC 340 Extraordinary Success |snaptutorial.com

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACC 340 Final ExamGuide For more classesvisit www.snaptutorial.com Multiple-ChoiceQuestions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed iscalled: Financialshadowing Managerial tracetechnique Concatenation Audittrail 2. Justifying expenditures for new technologies is especially difficult because: You do not know how many jobs will beaffected Expenses are often recurring and are difficult toestimate Many benefits are intangible and are not easily known ormeasured Justifying a new technology is no different from any other capital budgeting problem 3. The essential steps in performing a systems study are (in order of occurrence): Analysis, design, implementation and initial operation, followup Design, planning, follow up, analysis, andimplementation Planning, system specification, analysis, production,implementation Planning, analysis, design, implementation, and followup 4. What is the first step to be performed by most organizations in their accounting cycles?

  2. Recording business transactions in ajournal Preparing a trialbalance Recording closing entries in ajournal Preparing transaction sourcedocuments none of theabove 5. Which systems study step is normally performedfirst? Design Initialoperation Followup Analysis none of theabove 6. The purpose of a company firewall isto: Guard againstspoofing Assist theIETF Deny computer hackers access to sensitivedata all of theabove 7. The term data encryption refersto: Storing data in safe places called“crypts” Transforming data into secretcodes Scrambling data in random ways that cannot beunscrambled none ofthese 8. An advantage of an extranet isthat: It can disseminate information corporatewide It can be accessed by selected tradingpartners Users can employ common web browsers to access information in them all of theabove 9. Another name for an Internet domain address isits: URL ISP

  3. emailaddress IETF 10. Business process reengineering efforts sometimes fail because: Management gets too involved in theprocess Management is too optimistic regarding its expectations from itsimplementation Management support can never overcomeemployee resistance Employees will never acceptchange 11. The sales process beginswith: Placing an order with avendor A customer order for goods orservices Production of goods orservices Delivery of goods orservices 12. The primary objective in processing revenues isto: Sell as many goods aspossible Achieve timely and efficient cashcollection Maximize an organization’s salesorders Only sell goods to customers who can pay theirbills 13. An important input to the sales processis: A customer salesorder The cashforecast Aged accounts receivableinformation A receivingreport 14. Which of the following is not an example of a sourcedocument? Receiving report Purchaseorder Sales order Aging report

  4. 15. Inputs to transaction processingsystems: Are always in hardcopy Are best when input in a graphicalformat May be in an electronic format when an EDI system isused May never beaudio 16.Integrated accounting software programs generally include all of the following,except: Graphic reportingcapabilities Internetconnectivity One standardized chart ofaccounts The ability to handle multiplecompanies 17. Enterprise-wideAISs: Almost never pay forthemselves Do not include many more features than middle-range accounting softwarepackages Are seldom used by multinationalorganizations Integrate an organization’s financial functions with its other functionalareas 18. Training and change managementactivities: Take place just before the go live stage ofimplementation Are most effective when conducted throughout design, go live, and post-implementation follow-up Include technical trainingonly Do not include the design of userinterfaces 19. Which of the following software packages is not an example of a middle-rangeAIS? Great PlainsDynamics MAS90 SAPR/3 Solomon

  5. 20. Many organizations purchased new AISs during the1990’s: Because of the need for Year 2000compliance Because they wanted Internet connectivity In order to take advantage of opportunities forreengineering all of theabove ..................................................................................................................... ......................................... ACC 340 Week 1 Connect KnowledgeCheck For more classesvisit www.snaptutorial.com 1. The Certified Information Technology Professional is the position created by the AICPA to recognize CPAs who have the ability to provide skilled professional services on Information Technology. True False 2. The correct order of effects in the value chain are: Inbound Logistics → Operations → Service Inbound Logistics → Outbound Logistics → Marketing &Sales Inbound Logistics → Operations → Outbound Logistics Inbound Logistics → Operations →Shipping 3.

  6. Which designation would most appropriate for those professionals possessing an IT audit, control and securityskills? Certified Internal Auditor(CIA) Certified Information Systems Auditors (CISA) Certified Information Technology Professional (CITP) Certified Public Accountant(CPA) 4. Business Process Modeling Notation (BPMN) activity diagrams depict activities ascircles. True False 5. Obligatory business rules state what should not occur. True False 6. Which of the following is not a Stewardship and Reporting role of the Accounting/Finance Function inBusiness? Taxreturns Regulatorycompliance Statutoryreporting Human Resource management 7. Many hospitals and doctor's offices are beginning to digitize the medical records of their patients. This is an example ofthe strategicrole. Informate - up Automate Transform Informate -down 8. Which of the following best describes a businessmodel?

  7. A simple, abstract representation of a business process or processes. A sequence of businessactivities. An evaluation of potential business process improvements. None of theabove. 9. Which of the following is the best description of an association? The relationship between twoclasses The lines in a UML Classdiagram A group ofclasses The number of times one class is related to another 10. Which of the following best describes the purpose of a gateway in a Business Process Modeling Notation (BPMN) activitydiagram? Controls branching and merging. Shows where the work takes place. Describes the sequence of workflow. Affects the flow of the businessprocess. ..................................................................................................................... ......................................... ACC 340 Week 1 Discussion Question 1 For more classesvisit www.snaptutorial.com Why do some organizations continue to use both manual and computerized accounting informationsystems? ..................................................................................................................... .........................................

  8. ACC 340 Week 1 Textbook Assignment Problem 6 Ch. 1 For more classesvisit www.snaptutorial.com Write a response of no more than 1,050 words to Problem 6 from Ch. 1, "Accounting Information Systems and Firm Value" of Accounting InformationSystems. Click the Assignment Files tab to submit yourassignment. Using the accompanying explanations of each IT strategic role, suggest the appropriate IT strategic role (automate, informate or transform) for the following types of IT investments. Depending on your interpretation, it is possible that some of the IT investments could include two IT strategicroles. Digital healthrecords Google Maps that recommend hotels and restaurants along a trip path 25 Customer relationship management software d.Supply chain managementsoftware e.Enterprisesystems f.Airline flight reservations systems g.PayPal(www.paypal.com) h.Amazon.com product recommendation on your homepage i.eBay j.Course and teacher evaluations conducted online for the firsttime (instead of onpaper)

  9. .......................................................................................................................................................................................................................................... ......................................... ACC 340 Week 2 Connect KnowledgeCheck For more classesvisit www.snaptutorial.com 1. Control Objectives for Information and related Technology's (CobIT) guidance is guided by a structure that corresponds to the SDLC, namely: Plan and Organize, Acquire and Implement, Deliver and Support and Monitor andEvaluate. True False 2. While hierarchical and network data models require relationships to be formed at the database creation, relational data models can be made up as needed. True False 3.

  10. The project sponsor is generally the same person as the project manager. True False 4. The 100% Rule is a rule requiring 100% planning of all external tasks. True False 5. The analysis phase of the SDLC involves a complete, detailed analysis of the systems needs of the enduser. True False 6. To convert a conceptual model with a maximum Multiplicities relationship of "many to many" into relationship database tables, one must Many-to-many relationship cannot be represented inAccess. Create a relationship table to handle the many-to-many relationship. Create a relation with no attributes of itsown. Create a foreign key in one of the tables to link the twotables. 7.

  11. The Project Manager is the lead member of the project team that is responsible for theproject. True False 8. The critical path in a PERT chart represents: The most important tasks of the wholeproject. The longest path of tasks needed for projectcompletion. The tasks that must be completed withouterrors. The path of processes that is critical for systemadoption. 9. The triple constraint of project management includes the constraint of: Adoption Usability Technicalissues Time 10. In Access, users can edit database information in reports. True False ..................................................................................................................... .........................................

  12. ACC 340 Week 2 Discussion Question1 For more classesvisit www.snaptutorial.com What are some of the hardware components of your PC at work? How are they different from the components of your PC athome? ..................................................................................................................... ......................................... ACC 340 Week 2 Discussion Question2 For more classesvisit www.snaptutorial.com What are the benefits and limitations of the network being used at your organization? ..................................................................................................................... ......................................... ACC 340 Week 2 Enterprise SystemsPaper For more classesvisit

  13. www.snaptutorial.com • Prepare a 700- to 1,050-word paper to include thefollowing: • Describe the various types of enterprise wide accounting systems used inorganizations. • Explain how you might use the information system development process to implement a new system for yourorganization. • Discuss the steps involved in the developmentprocess. • Include a summary of the advantages and disadvantages of the different types of databases that are used in accountingsystems. • Click the Assignment Files tab to submit yourassignment. • ..................................................................................................................... • ......................................... • ACC 340 Week 2 Team Assignment Business Process • For more classesvisit www.snaptutorial.com • Select a company that you are familiar with to use as the basis for your assignment. • Select a business activity in your selected company. For example,the • sales activity, the accounting activity, the manufacturing activity, the hiring activity,etc. • Prepare a 10- to 12-slide presentation to include thefollowing: • Speakernotes.

  14. A description of the business activityprocess. • A Business Process Modeling Notation (BPMN) activity model for the selected businessactivity. • An explanation of how the use of technology will impact this business activity and the accounting for this activity. • Click the Assignment Files tab tosubmit. • ..................................................................................................................... • ......................................... • ACC 340 Week 3 Discussion Question 1 • For more classesvisit www.snaptutorial.com What are the advantages of a relational approach to database design? What are thedrawbacks? ..................................................................................................................... ......................................... ACC 340 Week 3 Discussion Question2 For more classesvisit www.snaptutorial.com

  15. Does your firm use a DBMS? Can you tell us about it? ..................................................................................................................... ......................................... ACC 340 Week 3 Team Database andReports For more classesvisit www.snaptutorial.com Use your selected business activity from Week2. Design at least two relational databasetables. Identify the primary keys and foreign keys for yourtables. Determine the reports you would create to assist management evaluate and monitor the businessprocess. Identify the relationships (using keys) that are needed to createthese reports. Click the Assignment Files tab to submit yourassignment. Note. Grades are awarded based upon individual contributions to the Learning Team assignment. Each Learning Team member receives a grade based upon his/her contributions to the team assignment. Not all students may receive the same grade for the teamassignment. ..................................................................................................................... ......................................... ACC 340 Week 4 Connect KnowledgeCheck For more classesvisit www.snaptutorial.com

  16. 1. Investments in business analytics systems support the balanced scorecard management process during the Link to Operations step. True False 2. The process of using sophisticated statistical techniques to extract and analyze data from large databases to discern patterns and trends that were not previously known iscalled: DataWarehouse Business Intelligence DataMining DataMart 3. Which of the following is not a value proposition characteristic expected to influence customervalue? Productattributes Image Relationship Innovation 4.

  17. Since both are regulators, the SEC and the IRS will likely have similar XBRL style sheets for the various XBRLfilings. True False 5. XBRL GL (also known as XBRL Global Ledger Taxonomy) serves as a means to facilitate efficient communication within afirm. True False 6. Network IT changes the way that work if performed and decisions are made. True False 7. Which of the following is not a step in the balanced scorecard managementprocess? Adapt Invest Monitor Translate

  18. 8. In February2009,thepassed the rule requiring all large domestic firms to begin formatting their financial statements using XBRL. Financial Accounting StandardsBoard American Institute of Certified Public Accountants International Accounting Standards Board Securities and ExchangeCommission 9. XBRL assurance is generally expected toinclude: The most current, standardized XBRL taxonomy isused. The underlying financial and nonfinancial data that is used in XBRL tagging isreliable. The XBRL tagging is accurate andcomplete. The reports include all relevant financial and nonfinancialinformation. 10. Which of the following is the best description of the Link to Operations step in the balanced scorecard managementprocess? The company examines the competitiveenvironment. The company establishes objectives, measures, targets, and initiatives. The company prepares operating budgets and prioritizes business process improvements. The company evaluates the effectiveness of itsstrategy.

  19. .......................................................................................................................................................................................................................................... ......................................... ACC 340 Week 4 Discussion Question1 For more classesvisit www.snaptutorial.com What are the steps in the SDLC? Which is most important? What are the ramifications of skipping one of thesesteps? ..................................................................................................................... ......................................... ACC 340 Week 4 Discussion Question 2 For more classesvisit www.snaptutorial.com What is your personal involvement in determining ISrequirements? ..................................................................................................................... ......................................... ACC 340 Week 4 Textbook Assignment Ch 13 Problem 1 and 2

  20. For more classesvisit www.snaptutorial.com Write a response of no more than 1,050 words to Problems 1 and 2 from Ch. 13, "The Balanced Scorecard and Business Value of Information Technology" on pp. 272 of Accounting InformationSystems. Click the Assignment Files tab to submit yourassignment. Select a prominent public company, such as Apple, Google, or Microsoft. Obtain recent annual reports and news articles about the company. Using that information, develop a strategy map that describes the company’s performance. Start by defining its value proposition, and then identifying key business processes that deliver that value proposition. Use the company that you selected for Problem 1. Identify examples of its learning and growth efforts and explain how those might affect its business processperformance. ..................................................................................................................... ......................................... ACC 340 Week 5 Computer FraudPaper For more classesvisit www.snaptutorial.com Prepare a 700- to 1,050-word article summary about a recent data breach or computer fraud at an organization to include the following:

  21. Describe the circumstances involved and the results of theevent. • Explain how the data breach occurred and what could have been done to prevent the breach/fraud fromoccurring. • Discuss what the organization has done or is doing to prevent the breach/fraud from occurring in thefuture. • Discuss the impact of the breach/fraud on theorganization. • Discuss whether you believe that most incidents of data breaches and fraud are reported to the public. Why or whynot? • Click the Assignment Files tab to submit yourassignment. • ..................................................................................................................... • ......................................... • ACC 340 Week 5 Discussion Question 1 • For more classesvisit www.snaptutorial.com What is the difference between a general control and an application control? ..................................................................................................................... ......................................... ACC 340 Week 5 Discussion Question 2 For more classesvisit www.snaptutorial.com

  22. What internal controls can be implemented using information systems to safeguard your organization’s electronicassets? ..................................................................................................................... ......................................... ACC 340 Week 5 Individual Assignment Final Exam For more classesvisit www.snaptutorial.com Multiple-ChoiceQuestions 1. The process by which a financial transaction is recorded so that its flow through the system can be followed iscalled: Financialshadowing Managerial tracetechnique Concatenation Audittrail 2. Justifying expenditures for new technologies is especially difficult because: You do not know how many jobs will beaffected Expenses are often recurring and are difficult toestimate Many benefits are intangible and are not easily known ormeasured Justifying a new technology is no different from any other capital budgeting problem

  23. 3. The essential steps in performing a systems study are (in order of occurrence): Analysis, design, implementation and initial operation, followup Design, planning, follow up, analysis, andimplementation Planning, system specification, analysis, production,implementation Planning, analysis, design, implementation, and followup 4. What is the first step to be performed by most organizations in their accounting cycles? Recording business transactions in ajournal Preparing a trialbalance Recording closing entries in ajournal Preparing transaction sourcedocuments none of theabove 5. Which systems study step is normally performedfirst? Design Initialoperation Followup Analysis none of theabove 6. The purpose of a company firewall isto: Guard againstspoofing Assist theIETF Deny computer hackers access to sensitivedata all of theabove 7. The term data encryption refersto: Storing data in safe places called“crypts” Transforming data into secretcodes Scrambling data in random ways that cannot beunscrambled none ofthese 8. An advantage of an extranet isthat:

  24. It can disseminate information corporatewide It can be accessed by selected tradingpartners Users can employ common web browsers to access information in them all of theabove 9. Another name for an Internet domain address isits: URL ISP emailaddress IETF 10. Business process reengineering efforts sometimes fail because: Management gets too involved in theprocess Management is too optimistic regarding its expectations from itsimplementation Management support can never overcomeemployee resistance Employees will never acceptchange 11. The sales process beginswith: Placing an order with avendor A customer order for goods orservices Production of goods orservices Delivery of goods orservices 12. The primary objective in processing revenues isto: Sell as many goods aspossible Achieve timely and efficient cashcollection Maximize an organization’s salesorders Only sell goods to customers who can pay theirbills 13. An important input to the sales processis: a) A customer salesorder

  25. The cashforecast Aged accounts receivableinformation A receivingreport 14. Which of the following is not an example of a sourcedocument? Receiving report Purchaseorder Sales order Aging report 15. Inputs to transaction processingsystems: Are always in hardcopy Are best when input in a graphicalformat May be in an electronic format when an EDI system isused May never beaudio 16.Integrated accounting software programs generally include all of the following,except: Graphic reportingcapabilities Internetconnectivity One standardized chart ofaccounts The ability to handle multiplecompanies 17. Enterprise-wideAISs: Almost never pay forthemselves Do not include many more features than middle-range accounting softwarepackages Are seldom used by multinationalorganizations Integrate an organization’s financial functions with its other functionalareas 18. Training and change managementactivities: Take place just before the go live stage ofimplementation Are most effective when conducted throughout design, go live, and post-implementation follow-up

  26. Include technical trainingonly Do not include the design of userinterfaces 19. Which of the following software packages is not an example of a middle-rangeAIS? Great PlainsDynamics MAS90 SAPR/3 Solomon 20. Many organizations purchased new AISs during the1990’s: Because of the need for Year 2000compliance Because they wanted Internet connectivity In order to take advantage of opportunities for reengineering all of theabove

More Related