Accounting Information Systems Quiz
48 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of the input subsystem in a computerized accounting system?

  • To collect, arrange, and make available various types of data (correct)
  • To ensure compliance with internal laws and rules
  • To process information using application software
  • To produce reports in a user-understandable format
  • Which component of the accounting information system is responsible for maintaining accounts payable and inventory information?

  • Purchasing and inventory management module (correct)
  • Production module
  • Human resources module
  • Sales module
  • How does the control component of an Accounting Information System ensure quality of information?

  • By preparing payroll information
  • By directly processing sales orders
  • By automating data collection
  • By comparing actual performance with set standards (correct)
  • Which of the following components tracks costs throughout the manufacturing process?

    <p>Production module</p> Signup and view all the answers

    What type of data does the sales module primarily manage?

    <p>Accounts receivable information</p> Signup and view all the answers

    What role does the output subsystem play in a computerized accounting system?

    <p>It generates reports in a format understandable to users</p> Signup and view all the answers

    What best describes malware?

    <p>Unwanted software installed without consent</p> Signup and view all the answers

    What does the control component of an accounting information system NOT ensure?

    <p>Processing of sales orders</p> Signup and view all the answers

    Which statement accurately characterizes a Trojan horse?

    <p>It disguises itself as legitimate software to steal information</p> Signup and view all the answers

    What is the primary risk associated with social engineering?

    <p>Tricking individuals into giving out sensitive information</p> Signup and view all the answers

    Which purpose is NOT typically associated with an Accounting Information System?

    <p>Personal finance management</p> Signup and view all the answers

    When does a logic bomb typically execute?

    <p>Upon reaching a specific time or triggered event</p> Signup and view all the answers

    What distinguishes worms from viruses?

    <p>Worms can self-replicate without a host file</p> Signup and view all the answers

    Which type of malware attaches itself to legitimate programs?

    <p>Trojan horse</p> Signup and view all the answers

    In what manner do viruses infect files?

    <p>Through user interaction with infected programs</p> Signup and view all the answers

    What type of malware is known for spamming advertisements?

    <p>Adware</p> Signup and view all the answers

    What does the NPER function determine?

    <p>The number of payments required for an investment to grow</p> Signup and view all the answers

    Which statement is true regarding simple interest?

    <p>It is calculated on the initial principal only.</p> Signup and view all the answers

    What is the main characteristic of a typical loan structured as an annuity?

    <p>A fixed amount paid every period</p> Signup and view all the answers

    If $2,000 is invested at a 10% interest rate compounded annually for 8 years, what will be the final balance?

    <p>$4,287</p> Signup and view all the answers

    How often is interest applied in the case of compound interest?

    <p>Periodically, according to the compounding schedule</p> Signup and view all the answers

    What is a primary feature of the RATE function?

    <p>It determines the effective interest rate per period.</p> Signup and view all the answers

    In a scenario where $2,000 is borrowed at a 12% annual interest rate compounded monthly for 6 months, what would be a likely outcome for monthly payments?

    <p>Payments would be over $400</p> Signup and view all the answers

    What tool can be used to enter function arguments for financial calculations?

    <p>Insert Function dialog box</p> Signup and view all the answers

    What does the formula B4/F4 translate to when sitting in cell B5?

    <p>Divide the value in the cell above by the value four columns to the right.</p> Signup and view all the answers

    What is the purpose of making a reference to cell F4 an absolute reference?

    <p>To ensure the formula always refers to the same cell, regardless of where it is copied.</p> Signup and view all the answers

    Which key should be pressed to convert a relative reference to an absolute reference in Excel?

    <p>F4</p> Signup and view all the answers

    What happens when you press the F4 key multiple times while setting an absolute reference?

    <p>It alternates between absolute column, absolute row, and both as absolute references.</p> Signup and view all the answers

    What will be the result of copying a formula that references $F$4?

    <p>The copied formulas will refer correctly to $F$4.</p> Signup and view all the answers

    Why did Excel use the $ symbol to indicate absolute references?

    <p>Due to limitations of early keyboard designs.</p> Signup and view all the answers

    If you are in B5 and need to copy a formula while maintaining a reference to F4 without changing it, what must you do?

    <p>Make the reference to F4 an absolute reference.</p> Signup and view all the answers

    What can you expect after correctly using the F4 key to set an absolute reference while building a formula?

    <p>All copied versions will accurately refer to the original absolute reference.</p> Signup and view all the answers

    What is the total amount of interest paid after the first month of payments?

    <p>$20.00</p> Signup and view all the answers

    How much is the new balance after the third payment?

    <p>$1,014.92</p> Signup and view all the answers

    What does the PMT function calculate?

    <p>The periodic payment for an annuity or loan</p> Signup and view all the answers

    What is the present value of receiving $200 per month for 3 years at 12% annual interest compounded monthly?

    <p>$6021.50</p> Signup and view all the answers

    What would be the future value if you deposit $1,000 today at an annual interest rate of 10% for 3 years with no additional payments?

    <p>$1,331.00</p> Signup and view all the answers

    If Ms. JustRetired is looking to withdraw equally each year from her $200,000 investment to have $100,000 left after 5 years, how much can she withdraw annually?

    <p>$36,380</p> Signup and view all the answers

    In the repayment schedule, what is the old balance after the fourth payment?

    <p>$1,014.92</p> Signup and view all the answers

    What does the type argument in PMT and PV functions indicate?

    <p>The timing of the payment (beginning or end of period)</p> Signup and view all the answers

    How much will you have after 3 years if you make monthly payments of $200 into an account with a 12% annual interest rate compounded monthly?

    <p>$8,615.38</p> Signup and view all the answers

    What is the purpose of the NPER function in investment calculations?

    <p>To return the number of periods for an investment</p> Signup and view all the answers

    If you invest $1,000 initially and contribute $100 monthly, what will the effective interest rate be if the final value after 10 years is $17,175.24?

    <p>6%</p> Signup and view all the answers

    What is the correct formula to calculate the difference in days between two dates in Excel?

    <p>=L6 - F5</p> Signup and view all the answers

    What will the TODAY function in Excel display?

    <p>The current date only</p> Signup and view all the answers

    Using the FV function, how much will you have after making monthly payments of $100 for 10 years into an account with a 5% annual interest rate compounded monthly, starting with an initial deposit of $1,000?

    <p>$17,175.24</p> Signup and view all the answers

    Which of the following formulas is used to convert a date into a serial number in Excel?

    <p>=DATE(year_number, month_number, day_number)</p> Signup and view all the answers

    If you need to find out how many years it will take to save $8,615.38 by saving $200 a month at a 12% annual interest rate compounded monthly, which function should you use?

    <p>NPER</p> Signup and view all the answers

    Study Notes

    Cybercrime Prevention Act of the Philippines

    • The act, also known as computer crime, uses a computer to further illegal activities
    • Examples include: fraud, child pornography, intellectual property theft, identity theft, and violation of privacy.

    Difference Between Traditional and Cybercrime

    • The key difference is the use of a computer in committing traditional crimes
    • Cybercrime primarily targets the information of individuals, governments, or corporations.

    Republic Act No. 10175 (Cybercrime Prevention Act of 2012)

    • Introduced by the Philippines government to combat cybercrime
    • Signed by President Benigno Aquino on September 12, 2012
    • Aimed to penalize acts like cybersex, child pornography, and identity theft.

    Illegal Access

    • Gaining unauthorized access to a computer or application.

    Illegal Interception

    • Intercepting non-public computer data transmissions without permission.

    Data Interference

    • Unauthorized modification, destruction, or deletion of computer data or electronic messages. This includes spreading viruses.

    System Interference

    • Interfering with a computer's or network's operation by introducing or spreading viruses, deleting, modifying, deleting or suppressing data and programs. This can apply even if technically authorized, but the actions exceed the agreed scope.

    Misuse of Devices

    • Unauthorized use, possession, production, sale, procurement, or importation of gadgets, computer programs, or materials meant to commit crimes listed in Republic Act 10175.
    • Also includes unauthorized use of passwords, access codes, or similar data for malicious use.

    Cybersquatting

    • Acquiring domain names in bad faith to profit, deceive, and harm the reputation of others, especially those with trademarks already registered.
    • Unauthorized input, alteration, or deletion of computer data to make it appear authentic, regardless if the data is immediately readable.
    • Unauthorized access, alteration, or deletion of computer data or programs, or disrupting a computer system with the goal of causing harm.
    • Unauthorized acquisition, use, transfer, possession, change, or deletion of a person's identifying information.

    Cybersex

    • Engaging in lascivious presentations or sexual activity via a computer system with compensation or consideration.

    Child Pornography

    • Unlawful or restricted actions conducted via a computer system.

    Libel

    • Defamation of character. Also, covered by the Revised Penal Code if conducted through computer systems or other similar means.

    Aiding or Abetting in Cybercrime

    • Anyone assisting in any listed cybercrime is also held accountable.

    Attempting Cybercrime

    • Attempting to commit any listed cybercrime is considered a crime.

    Final Examination Dates

    • December 2nd to 7th

    Other Important Events

    • December 9th - 10th: BSIT Christmas Party
    • December 11, 2024: 12:00PM Exchange Gift, Raffle, Games
    • December 12th - January 6th: Sem Break

    Importance of Cyber Security

    • Attackers can operate from anywhere globally
    • Risks include: identity theft, financial losses, legal ramifications, and job/account termination

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on the core components and functions of Accounting Information Systems. This quiz covers topics such as input and output subsystems, data management, and common security threats in computerized accounting. Perfect for students or professionals looking to brush up on their accounting tech skills.

    More Like This

    Use Quizgecko on...
    Browser
    Browser