All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
What is a knowledge base? How is it different from a database?
Why are data warehouses important to decision makers?
Use the Internet to research the database integration features of an ERP software package and a CRM software package. The number of pages will be indicated by your instructor.a. Learn about the ERP
What is business intelligence (BI)?
What is an entity? Distinguish an entity and an instance of an entity.
What is a key attribute (e.g., a primary key)? What coding techniques can be used to create good primary key attributes?
What are the three steps in the strategy to effectively identify all the relationships that should be included in a model? What is the most common way to gather information about the relationships?
What are the characteristics of recursive relationships that distinguish them from other types of relationships?
Describe a situation in which one entity has minimum participation in its relationship with another entity.
How can an REA model help an organization improve the level of data integration it achieves across multiple business processes?
What is a relation? What is a tuple?
What is referential integrity? Give an example of how it may be implemented in a DBMS.
What is a composite primary key?
What is the difference in implementation of a one-to-many and a oneto-one relationship in a relational database model?
What is SQL? In general terms, how can it be used?
What are the three ways to use SQL to change data in a database?
What are the three components of the SQL SELECT statement?
How do you create SQL commands in Microsoft Access?
Describe organizational governance.
Describe Enterprise Risk Management (ERM).
Describe the eight elements of ERM.
Describe and compare risks and opportunities.
Describe four risk responses.
What gave rise to the Sarbanes-Oxley Act of 2002 (SOX)?
What are the key provisions of SOX?
What is COSO?
Describe the elements common to most current definitions of internal control.
What is the relationship between fraud and internal control?
What is computer crime?
What is malware? Name and explain three types of malware.
Explain what is meant by the control environment. What elements might comprise the control environment?
Explain how business ethics relate to internal control.
a. What are the three generic control goals of operations processes?b. Explain the difference between the following pairs of control goals:(1) ensure effectiveness of operations processes and ensure
a. What are the five generic control goals of information processes?b. Explain the difference between the following pairs of control goals:(1) ensure input validity and ensure input accuracy; (2)
What are the differences among the control environment, a pervasive control plan, and a business process control plan?
Distinguish among preventive, detective, and corrective control plans.
What are the four major categories of pervasive controls? Why would the PCAOB refer to these controls as entity level?
What are the differences among a pervasive control plan, a business process control plan, an application control plan, and an IT control process?
Segregation of duties consists of separating what four basic functions?Briefly define each function.
Describe some compensating controls that can be used to reduce exposures when it is not possible to properly segregate duties in a small organization.
What are policy controls plans? How do policies differ from laws?
Describe one specific control for each of the following categories of personnel control plans: hiring, retention, development, management, and termination.
Why should an organization conduct monitoring activities? Who should conduct monitoring activities? What are the two major steps in monitoring?
What is IT governance?
What are the principal responsibilities, major duties, and key control concerns of each functional position pictured in Figure 8.4 on page 266 (i.e., the organization chart of an IT organization)?
What is the COBIT framework? How does it differ from the COSO framework?
Name the four IT resources as delineated by COBIT.
How does the COBIT framework define control?
What are the four IT control process domains?
What is the purpose of the strategic IT plan?
What are the major elements of the strategic IT plan?
What functions within the IT organization should be segregated?
What is the systems development life cycle (SDLC)?
What types of documentation constitute a well-documented application?Describe each type.
What are the four stages through which a program should move as it is being developed? Who should have responsibility for each of those phases?
What steps are commonly included in a business continuity planning methodology?
Describe backup and recovery.
Describe continuous data protection (CDP), a mirror site, and electronic vaulting.
What is the difference between a hot site and a cold site?
Describe a denial-of-service attack. What controls are recommended to detect or correct such an attack?
Describe the three layers of controls for restricting physical access to computer facilities.
Explain biometric identification systems.
Describe the four layers of controls for restricting logical access to stored programs, data, and documentation.
Distinguish firewalls, intrusion detections systems (IDS), and intrusion prevention systems (IPS).
Describe library controls.
What is data encryption? What is the key in encryption? What is the algorithm in encryption? What is public-key cryptography?
Define computer hacking and cracking, and explain how they undermine resource security.
Provide three examples of hacking techniques. Which technique do you think is most prevalent?
a. What kinds of damage are included in the category of environmental hazards?b. What control plans are designed to prevent such hazards from occurring?c. What control plans are designed to limit
1. Using a key of 2, and an algorithm of add and subtract from alternating letters starting with addition, encrypt the word “accounting.”2. Using a key of 3 and an algorithm of add and subtract
Explain the difference between the category of business process control and application control.
Describe the relationship between the control matrix and the systems flowchart.
How could the control matrix be used to recommend changes in the system to improve control of that system?
How would the control matrix be useful in evaluating control effectiveness, control efficiency, and control redundancy? Include in your answer a definition of these three terms.
What are the steps involved in preparing a control matrix?
Describe the four common programmed edit checks.
How do the 12 control plans listed in Figure 9.4 (pg. 311) work? FIGURE 9.4 Control Matrix for Manual and Automated Data Entry Recommended Control Plans Present Controls P-1: Document design P-2:
Name and explain four different types of batch totals that could be calculated in a batch processing system.
How do the seven control plans (five present, two missing) listed in Figure 9.6(pg. 320) work? FIGURE 9.6 Control Matrix for Data Entry with Batches Recommended Control Plans Present Controls P-1:
Referring to Appendix 9A, distinguish among data encryption, public key cryptography, and digital signatures. Appendix 9A Public Key Cryptography and Digital Signatures As we noted in Chapter 8, a
Refer to Exhibit 9.5 (pg. 325). For each pair of factors, describe why you believe the factor in the right column provides a higher level of assurance.That is, why do these factors indicate a
What is the order entry/sales (OE/S) process?
What are the major functions performed by the OE/S process? Explain each function.
With what internal and external entities does the OE/S process interact?
What “key players” would you expect to find in the marketing function’s organization chart?
Describe Web 2.0. What tools does Web 2.0 include?
Describe several ways that data warehouses and data mining can support the marketing function.
Distinguish buy-side and sell-side systems.
Discuss how customer relationship management (CRM) systems aid a customer service representative (CSR) in providing service to customers.
The following questions concern the logical description of the OE/S process:a. What are the three major processes? Describe the subsidiary processes of each major process.b. What three exception
Describe the five master data stores employed by the OE/S process.
a. Explain how bar code readers work.b. Explain how optical character recognition (OCR) works and how it differs from bar code technology.c. Explain how scanners are used to capture data.
How is digital image processing used to support the input and management of images and documents?
Each of the following questions concerns the control matrix for the OE/S process (Figure 10.13) and its related annotated systems flowchart (Figure 10.11):a. What three effectiveness goals does the
Describe the key control plans associated with OE/S processes.
Describe the impact that entity-level controls (i.e., control environment, pervasive controls, and general/IT general controls) can have on the effectiveness of OE/S business process controls.
What is the billing/accounts receivable/cash receipts (B/AR/CR) process?
What primary activities does the B/AR/CR process perform? Explain each activity.
With what internal and external entities does the B/AR/CR interact?
What functions are typically segregated in the B/AR/CR process?
Showing 1000 - 1100
of 2929
First
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Last