Deck 7: Electronic Data Processing Systems

Full screen (f)
exit full mode
Question
Bar coding is an automatic identification technique used in a real-time system.
Use Space or
up arrow
down arrow
to flip the card.
Question
A company will often analyze its customers' sales trends and predict future needs.
Question
There are two major EDI phases.
Question
Sending an electronic catalog has the same advantages as sending it in paper form.
Question
The absence of control procedures over data transmitted between user departments and the data processing department could represent a serious weakness in the system.
Question
An edit program performs a table lookup when it compares the actual value of a field to acceptable values found in a table.
Question
Data editing routines may be applied to each of the basic data structures.
Question
The use of input control documents is not necessary when forwarding data to the data entry group for input into the system.
Question
Program data editing is often used in place of verification.
Question
A company can use bar coding technology to achieve maximum benefit without code standardization.
Question
When key-verification software is used,the software automatically corrects any mismatches to ensure smooth and uninterrupted processing.
Question
Accounting data entered into an Accounting Information System must be in the form of debits and credits.
Question
A sales order is an example of a source document that may be prepared manually.
Question
Sophisticated information systems can capture system events and their attributes.
Question
The essential EDI phases include the physical receipt of the order,validation and authentication,and decryption and translation.
Question
Visual verification is another highly effective method used to detect data-entry errors.
Question
Bar coding is a manual identification technique used in a real-time system.
Question
The Internet has enhanced the real-time sales system by extending it to customers who are off-site.
Question
A check digit is a value found in an input field that is visually compared,or "checked."
Question
A batch control form should require the preparer's signature or name.
Question
When preparing the transaction file,occasional data editing of source documents prior to input is suggested.
Question
Line codes should never be stored within the general ledger file itself.
Question
A sequentially organized master file commonly resides on a direct-access storage device.
Question
Batch processing can only be performed using random-accessed (i.e.,direct or indexed)file updating.
Question
All electronic input systems are referred to as on-line input systems.
Question
Editing as a function may be placed between the input and process functions in a processing flow diagram.
Question
Matching a vendor code to a table file of valid vendor codes is an example of a valid code check.
Question
Using an electronic input system helps ensure the segregation of duties and provides a solid audit trail.
Question
A transmission acknowledgment reports in detail the items in the received message.
Question
A functional acknowledgment acknowledges receipt of the message and reports in detail the items in the received message.
Question
There are three major aspects to the operation of a computerized general ledger system.
Question
A common example of an automated identification system is an automated Point-of-Sale system used in most retail,grocery,and discount stores.
Question
Line coding is the process that links general ledger accounts and the reports in which they appear.
Question
All entries into the general ledger should be documented with journal vouchers.
Question
Few manual processing systems are batch oriented.
Question
Batch processing is economical when large numbers of transactions must be processed.
Question
All electronic input systems require no human intervention.
Question
Tagging occurs when additional,audit-oriented information is included with original transaction data.
Question
An output distribution register is maintained to control the disposition of reports.
Question
An input document control form documents real-time totals of input data transmitted between user departments and the data processing department.
Question
Sequential-access file updating is simpler than random-access file updating.
Question
________ ________ input sales data into the computer system for processing immediately at the time and point of sale.
Question
Because real-time sales systems pose certain internal control problems,good computer security and careful program data edit checks are essential.
Question
Using an OLRS,master files are always up-to-date because they are updated as soon as transaction data is input.
Question
Control of transaction process is far less involved in OLRS than it is in batch-oriented systems.
Question
The use of programmed edit checks to discriminate among acceptable data is called ________ ________ auditing.
Question
Using ________ ________ can compensate for the loss of manual internal controls.
Question
A significant degree of cooperation among trading partners is required to implement real-time sales systems.
Question
EDI documents typically contain three control numbers,two at the beginning of the message and one at the end.
Question
Using son-father-grandfather retention,if the old master file is the ________,the backup master file must be the ________.
Question
On-line,real-time electronic systems produce significant amounts of output.
Question
An accounts receivable control file is a summary of the accounts receivable by type of account,such as "installment" or "net 30 days."
Question
Batch-processing systems rely almost exclusively on wands and scanners for UPC bar code recognition.
Question
Computer processing of accounting data is typically a(n)________ procedure.
Question
Point-of-sale systems provide a variety of timely and detailed reports concerning operations,which is of great benefit to the management of a retail firm.
Question
Paid customer invoice records are retained on-line for a year and are available for inquiries.
Question
The use of ________ control over the entire data processing input-process-output sequence is fundamental to organizational independence.
Question
The last step in the cash remittance processing of customer payments by check is to restrictively endorse the checks.
Question
Many manual,batch-oriented systems use ________ file processing.
Question
Comparing the activity file and the bank summary file does not ensure that all cash has been deposited and has been applied and recorded on the activity file.
Question
Fundamental controls over data transfer between user departments and data processing include

A) batch control totals.
B) data transfer registers.
C) activity file totals.
D) Answers A and B are both correct.
Question
A data editing routine that compares numeric data input within a range is a(n)

A) table lookup.
B) hash total check.
C) limit test.
D) internal label test.
Question
Users interactively input data in ________ ________ systems.
Question
The technologies that make real-time sales systems feasible are the ________ system; bar coding for automatic identification,and the ________ ordering system.
Question
Errors in the keying operation can be detected using

A) a key verification control procedure.
B) a data transfer control register.
C) program data editing.
D) None of these is correct.
Question
The ________ has enhanced the real-time sales system by extending it to customers who are off-site.
Question
In a manual input system,batch controls are prepared initially by the

A) EDP department.
B) computer software.
C) user department.
D) general ledger department.
Question
Program data editing techniques may be applied to

A) fields.
B) records.
C) files.
D) All of these answers are correct.
Question
The summary of the current month's general ledger activity is the general ledger by ________.
Question
A software-based control procedure that checks for some errors as they are being input is called

A) input verification.
B) key verification.
C) input control testing.
D) transcription checking.
Question
Program data editing is a software technique that should

A) be used in addition to verification.
B) be used in place of verification.
C) be applied only to characters within input fields.
D) only be used after visual verification has detected errors in the input.
Question
Input data should be accompanied by the completion of a(n)

A) data transfer log.
B) input document control form.
C) data transfer register.
D) key verification control procedure.
Question
As a control procedure,key verification requires that

A) user departments key all of their own data.
B) input fields are visually verified.
C) key mismatches are electronically corrected.
D) each source document is key-transcribed a second time.
Question
A data editing routine that compares data with acceptable values is a

A) limit test.
B) table lookup.
C) financial total check.
D) valid code check.
Question
A group that is often part of the internal audit function that is charged with monitoring EDP operations is the ________ ________ group.
Question
In a real-time sales system,________ can be used to transmit retail sales data captured from the retail store to vendors.
Question
Key verification is often used

A) to verify only selected essential fields.
B) to verify essential and nonessential numeric fields.
C) to verify all input fields, both alpha and numeric.
D) when two or more people key input data in unison.
Question
Key verification control procedures

A) edit data.
B) do not use batch totals.
C) do not edit data.
D) electronically replace incorrect data with data from an existing database.
Question
Each month ________ ________ should be reconciled to reports prepared from the bank summary file.
Question
An extra digit added to a code number verified by applying mathematical calculations to the individual code number characters is a

A) control digit.
B) hash digit.
C) check digit.
D) verification digit.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/126
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Electronic Data Processing Systems
1
Bar coding is an automatic identification technique used in a real-time system.
True
2
A company will often analyze its customers' sales trends and predict future needs.
True
3
There are two major EDI phases.
False
4
Sending an electronic catalog has the same advantages as sending it in paper form.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
5
The absence of control procedures over data transmitted between user departments and the data processing department could represent a serious weakness in the system.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
6
An edit program performs a table lookup when it compares the actual value of a field to acceptable values found in a table.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
7
Data editing routines may be applied to each of the basic data structures.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
8
The use of input control documents is not necessary when forwarding data to the data entry group for input into the system.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
9
Program data editing is often used in place of verification.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
10
A company can use bar coding technology to achieve maximum benefit without code standardization.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
11
When key-verification software is used,the software automatically corrects any mismatches to ensure smooth and uninterrupted processing.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
12
Accounting data entered into an Accounting Information System must be in the form of debits and credits.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
13
A sales order is an example of a source document that may be prepared manually.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
14
Sophisticated information systems can capture system events and their attributes.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
15
The essential EDI phases include the physical receipt of the order,validation and authentication,and decryption and translation.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
16
Visual verification is another highly effective method used to detect data-entry errors.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
17
Bar coding is a manual identification technique used in a real-time system.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
18
The Internet has enhanced the real-time sales system by extending it to customers who are off-site.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
19
A check digit is a value found in an input field that is visually compared,or "checked."
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
20
A batch control form should require the preparer's signature or name.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
21
When preparing the transaction file,occasional data editing of source documents prior to input is suggested.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
22
Line codes should never be stored within the general ledger file itself.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
23
A sequentially organized master file commonly resides on a direct-access storage device.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
24
Batch processing can only be performed using random-accessed (i.e.,direct or indexed)file updating.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
25
All electronic input systems are referred to as on-line input systems.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
26
Editing as a function may be placed between the input and process functions in a processing flow diagram.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
27
Matching a vendor code to a table file of valid vendor codes is an example of a valid code check.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
28
Using an electronic input system helps ensure the segregation of duties and provides a solid audit trail.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
29
A transmission acknowledgment reports in detail the items in the received message.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
30
A functional acknowledgment acknowledges receipt of the message and reports in detail the items in the received message.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
31
There are three major aspects to the operation of a computerized general ledger system.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
32
A common example of an automated identification system is an automated Point-of-Sale system used in most retail,grocery,and discount stores.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
33
Line coding is the process that links general ledger accounts and the reports in which they appear.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
34
All entries into the general ledger should be documented with journal vouchers.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
35
Few manual processing systems are batch oriented.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
36
Batch processing is economical when large numbers of transactions must be processed.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
37
All electronic input systems require no human intervention.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
38
Tagging occurs when additional,audit-oriented information is included with original transaction data.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
39
An output distribution register is maintained to control the disposition of reports.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
40
An input document control form documents real-time totals of input data transmitted between user departments and the data processing department.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
41
Sequential-access file updating is simpler than random-access file updating.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
42
________ ________ input sales data into the computer system for processing immediately at the time and point of sale.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
43
Because real-time sales systems pose certain internal control problems,good computer security and careful program data edit checks are essential.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
44
Using an OLRS,master files are always up-to-date because they are updated as soon as transaction data is input.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
45
Control of transaction process is far less involved in OLRS than it is in batch-oriented systems.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
46
The use of programmed edit checks to discriminate among acceptable data is called ________ ________ auditing.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
47
Using ________ ________ can compensate for the loss of manual internal controls.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
48
A significant degree of cooperation among trading partners is required to implement real-time sales systems.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
49
EDI documents typically contain three control numbers,two at the beginning of the message and one at the end.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
50
Using son-father-grandfather retention,if the old master file is the ________,the backup master file must be the ________.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
51
On-line,real-time electronic systems produce significant amounts of output.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
52
An accounts receivable control file is a summary of the accounts receivable by type of account,such as "installment" or "net 30 days."
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
53
Batch-processing systems rely almost exclusively on wands and scanners for UPC bar code recognition.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
54
Computer processing of accounting data is typically a(n)________ procedure.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
55
Point-of-sale systems provide a variety of timely and detailed reports concerning operations,which is of great benefit to the management of a retail firm.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
56
Paid customer invoice records are retained on-line for a year and are available for inquiries.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
57
The use of ________ control over the entire data processing input-process-output sequence is fundamental to organizational independence.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
58
The last step in the cash remittance processing of customer payments by check is to restrictively endorse the checks.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
59
Many manual,batch-oriented systems use ________ file processing.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
60
Comparing the activity file and the bank summary file does not ensure that all cash has been deposited and has been applied and recorded on the activity file.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
61
Fundamental controls over data transfer between user departments and data processing include

A) batch control totals.
B) data transfer registers.
C) activity file totals.
D) Answers A and B are both correct.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
62
A data editing routine that compares numeric data input within a range is a(n)

A) table lookup.
B) hash total check.
C) limit test.
D) internal label test.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
63
Users interactively input data in ________ ________ systems.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
64
The technologies that make real-time sales systems feasible are the ________ system; bar coding for automatic identification,and the ________ ordering system.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
65
Errors in the keying operation can be detected using

A) a key verification control procedure.
B) a data transfer control register.
C) program data editing.
D) None of these is correct.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
66
The ________ has enhanced the real-time sales system by extending it to customers who are off-site.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
67
In a manual input system,batch controls are prepared initially by the

A) EDP department.
B) computer software.
C) user department.
D) general ledger department.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
68
Program data editing techniques may be applied to

A) fields.
B) records.
C) files.
D) All of these answers are correct.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
69
The summary of the current month's general ledger activity is the general ledger by ________.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
70
A software-based control procedure that checks for some errors as they are being input is called

A) input verification.
B) key verification.
C) input control testing.
D) transcription checking.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
71
Program data editing is a software technique that should

A) be used in addition to verification.
B) be used in place of verification.
C) be applied only to characters within input fields.
D) only be used after visual verification has detected errors in the input.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
72
Input data should be accompanied by the completion of a(n)

A) data transfer log.
B) input document control form.
C) data transfer register.
D) key verification control procedure.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
73
As a control procedure,key verification requires that

A) user departments key all of their own data.
B) input fields are visually verified.
C) key mismatches are electronically corrected.
D) each source document is key-transcribed a second time.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
74
A data editing routine that compares data with acceptable values is a

A) limit test.
B) table lookup.
C) financial total check.
D) valid code check.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
75
A group that is often part of the internal audit function that is charged with monitoring EDP operations is the ________ ________ group.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
76
In a real-time sales system,________ can be used to transmit retail sales data captured from the retail store to vendors.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
77
Key verification is often used

A) to verify only selected essential fields.
B) to verify essential and nonessential numeric fields.
C) to verify all input fields, both alpha and numeric.
D) when two or more people key input data in unison.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
78
Key verification control procedures

A) edit data.
B) do not use batch totals.
C) do not edit data.
D) electronically replace incorrect data with data from an existing database.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
79
Each month ________ ________ should be reconciled to reports prepared from the bank summary file.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
80
An extra digit added to a code number verified by applying mathematical calculations to the individual code number characters is a

A) control digit.
B) hash digit.
C) check digit.
D) verification digit.
Unlock Deck
Unlock for access to all 126 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 126 flashcards in this deck.