Order ready-to-submit essays. No Plagiarism Guarantee!
Note: All our papers are written from scratch by human writers to ensure authenticity and originality.
Question 1 Employee numbers have all numeric characters. To prevent the input of alphabetic characters, what technique should be used?
Question 2 A bank wants to reject erroneous checking account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this?
Question 3 First Federal S&L has an online real-time system, with terminals installed in all of its branches. This system will not accept a customer’s cash withdrawal instructions in excess of $1,000 without the use of a “terminal audit key.” After the transaction is authorized by a supervisor, the bank teller then processes the transaction with the audit key. This control can be strengthened by
Question 4 Which of the following is a computer test made to ascertain whether a given characteristic belongs to the group?
Question 5 A brokerage firm has changed a program so as to permit higher transaction volumes. After proper testing of the change, the revised programs were authorized and copied to the production library. This practice is an example of
Question 6 In a daily computer run to update checking account balances and print out basic details on any customer’s account that was overdrawn, the overdrawn account of the computer programmer was never printed. Which of the following control procedures would have been most effective in detecting this fraud?
Question 7 In updating a computerized accounts receivable file, which one of the following would be used as a batch control to verify the accuracy of the total credit posting?
Question 8 A computer input control is designed to ensure that
Question 9 Which of the following is a critical success factor in data mining a large data store?
Question 10 Which of the following items would be most critical to include in a systems specification document for a financial report?
Question 11 ABC, Inc. assessed overall risks of MIS systems projects on two standard criteria: technology used and design structure. The following systems projects have been assessed on these risk criteria. Which of the following projects holds the highest risk to ABC?
Question 12 In which of the following phases of computer system development would training occur?
Question 13 Which of the following structures refers to the collection of data for all vendors in a relational data base?
Question 14 Which of the following is a primary function of a database management system?
Question 15 Which of the following is not true? Relational databases
Question 16 Which of the following terms best describes a payroll system?
Question 17 Most client/server applications operate on a three-tiered architecture consisting of which of the following layers?
Question 18 A data warehouse in an example of
Question 19 Which of the following is considered an application input control?
Question 20 An accounts payable clerk is accused of making unauthorized changes to previous payments to a vendor. Proof could be uncovered in which of the following places?
Question 21 An employee mistakenly enters April 31 in the date field. Which of the following programmed edit checks offers the best solution for detecting this error?
Question 22 Which of the following input controls would prevent an incorrect state abbreviation from being accepted as legitimate data?
Question 23 Which of the following controls would assist in detecting an error when the data input clerk records a sales invoice as $12.99 when the actual amount is $122.99?
Question 24 A validation check used to determine if a quantity ordered field contains only numbers is an example of a (n)
Question 25 An input clerk enters a person’s employee number. The computer responds with a message that reads
“Employee number that you entered is NOT assigned to an active employee. Please reenter.” What technique is the computer using?
Verify your essay before you submit. Get an Official Turnitin Report for Just $8.99!
Check your paper with the same Turnitin report your professor uses. AI detection + similarity score without storing your work. Pay once, no subscription
Check My Assignment!

