1. Which transaction cycle includes interaction between anand its suppliers b) expenditure cyck c) humusupayroll cycle d) peneral ledger and reporting system 2. Which of the following is most likely to be a peneral terter control account? a) cove by petty cash ci prepaid rent dretained caring 3. All of the following are guidelines that should be followed in naming DFD data clements EXCEPT a) Process names should include action the sechs update, edit, prepare and record b) Make sure the names describe all the data or the cute process c) Namely the most important DFD elements d) Choose active and descriptive names 4. Which of the following is an individual's view of the database! a conceptul deve scheme bestemal-level chema c) intomal-level schema d) logical levelschema Which of the following conditions is NOT recessary for a fraud to court a) pressure b) opportunity cien dy rational 6. A perpetrator attacks phone systems to obtain free phone line access or we telephone lines to travies and to aces, steal, and destroy data. What is this computer fraud technique called a)phishing b) paking c) pharming d)vishing 7. Free where doing the way! a) reasurer by controller c) variou accounting cycle subsystem, mach as sales onder entry dit managers 8. Recording and processing information about a transactionat the time it takes place is referred to as which of the following a) batch processing b) online, real-time processing c) captured transaction processing d) chart of accounts processing 9. How are data sources and destinations represented in a data flow diagram? ayasa que b) as a curved now c) as a circle d) as two parallel lines 10. Which of the following atributes in the Cash Recipes table representing payments received from customers would most likely be a foreign key! a) cash receipt her b) customer check number c) customer sumber d) cash receipt date 1. Which transaction cycle includes interaction between anand its suppliers b) expenditure cyck c) humusupayroll cycle d) peneral ledger and reporting system 2. Which of the following is most likely to be a peneral terter control account? a) cove by petty cash ci prepaid rent dretained caring 3. All of the following are guidelines that should be followed in naming DFD data clements EXCEPT a) Process names should include action the sechs update, edit, prepare and record b) Make sure the names describe all the data or the cute process c) Namely the most important DFD elements d) Choose active and descriptive names 4. Which of the following is an individual's view of the database! a conceptul deve scheme bestemal-level chema c) intomal-level schema d) logical levelschema Which of the following conditions is NOT recessary for a fraud to court a) pressure b) opportunity cien dy rational 6. A perpetrator attacks phone systems to obtain free phone line access or we telephone lines to travies and to aces, steal, and destroy data. What is this computer fraud technique called a)phishing b) paking c) pharming d)vishing 7. Free where doing the way! a) reasurer by controller c) variou accounting cycle subsystem, mach as sales onder entry dit managers 8. Recording and processing information about a transactionat the time it takes place is referred to as which of the following a) batch processing b) online, real-time processing c) captured transaction processing d) chart of accounts processing 9. How are data sources and destinations represented in a data flow diagram? ayasa que b) as a curved now c) as a circle d) as two parallel lines 10. Which of the following atributes in the Cash Recipes table representing payments received from customers would most likely be a foreign key! a) cash receipt her b) customer check number c) customer sumber d) cash receipt date