New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
accounting information systems
Accounting Information Systems 8th Edition George H. Bodnar, William S. Hopwood - Solutions
In auditing through a computer, the test data method is used by auditors to test the(a) accuracy of input data.(b) validity of the output.(c) procedures contained within the program.(d) normalcy of distribution of test data.
Which of the following methods of testing application controls utilizes a generalized audit software package prepared by the auditors?(a) parallel simulation(b) integrated testing facility approach(c) test data approach(d) exception report tests -
A primary advantage of using generalized audit software packages in auditing the financial statements of a client that uses a computerized system is that the auditor may(a) substantiate the accuracy of data through self-checking digits and hash totals.(b) access information stored on computer files
An auditor most likely would test for the presence of unauthorized information systems program changes by running a(a) program with test data.(b) check digit verification program.(c) source code comparison program.(d) program that computes control totals.
The XYZ company operates a large Web-based retail shoe business. All sales orders are entered by the customer into a secure server. Only credit card orders are accepted, and the verification is immediate so that bad debts are impossible. But there are some cases of chargebacks due to customers' use
The internal auditor for the ABC Company is considering making a copy of the company's entire accounting system and data files. He then wants to process thousands of test transactions through the copied system.Required(a) Describe the pros and cons of working a copy of the real system, as opposed
You are the internal auditor for a small manufacturing company, and for the first time you have just used a new automated audit system. You installed the audit system on one of the main accounting servers, and it then automatically scanned all the files in the entire accounting system. At the end
The CEO for the GGG Company wants the internal auditor to audit around the company's retail Web site. The goal would be to cut costs and simplify the internal audit.Required(a) Would it be possible to effectively and efficiently audit around the retail Web site? Why or why not?(b) Explain at least
As part of the internal audit process, you are considering launching a complete analysis of the program logic that is behind the processing of all the company's retail transactions over the Web. You want to review the way that all calculations are made, including those for sales tax, shipping,
The ZZZY Company has adopted a new high-end internal-audit system that has all the latest in artificial intelligence built into it. The vendor of the system claims that the system is so sophisticated that it can spot any problem imaginable, even before it happens. Further, the system comes with a
Identify several key activities in systems operation. Briefly discuss the components of the systems implementation plan.
Why is detailed systems design work necessary during the systems implementation phase
Contrast and compare the modular versus parallel operations approaches to conversion.
Discuss several functions of systems documentation.
What is the relative magnitude of the typical information systems budget to the budget of the entire organization?
What is the nature of information systems costs? Are they mostly fixed or mostly variable with respect to information systems activity?
Identify several types of insurance a firm might carry to minimize information systems-related loss exposure.
What are the relative merits of purchasing information systems equipment over leasing it or renting it from a vendor?
Identify several financial control strategies that may be used in the management of information systems.
What is a chargeback system? Distinguish between a predetermined rate system and a cost allocation system for chargeback of information systems costs to users.
How does a cost recovery system for information systems chargeback differ from a transfer pricing approach to information systems chargeback?
What are the likely consequences of not charging users for their consumption of information systems resources?
Which of the following is an information property concerned with the degree of detail in information?(a) accuracy(b) conciseness(c) relevance(d) quantifiability
Which of the following is an information property concerned with the degree to which information measures what it purports to measure?(a) accuracy(b) conciseness(c) relevance(d) quantifiability
Which of the following is an information property concerned with the degree of difficulty in representing a given event numerically?(a) accuracy(b) conciseness(c) relevance(d) quantifiability
Which of the following is an information property concerned with how well information relates to a given decision?(a) accuracy(b) conciseness(c) relevance(d) quantifiability
Which of the following is a type of budget that specifically allows for varying levels of activity?(a) master budget(b) flexible budget(c) profit budget(d) static budget
Which of the following types of reports assist in acquiring and allocating resources for future operations?(a) master reports(b) control reports(c) operational reports(d) planning reports
Which of the following might be described as status reports?(a) master reports(b) control reports(c) operational reports(d) planning reports
Which of the following terms is used to describe a request for information contained in a database?(a) report(b) dialog(c) query(d) seek
Microcomputer spreadsheet software is a common example of which of the following?(a) expert system(b) decision support system(c) executive information system(d) reporting system
Consider the following payoff matrix for a golddigger:What is the value of perfect information?(a) \(\$ 0\)(b) \(\$ 8,000\)(c) \(\$ 32,000\)(d) \(\$ 40,000\) STATE OF NATURE PROBABILITY DIG Gold 0.2 $40,000 No Gold 0.8 -$10,000 ACTION DO NOT DIG SO $0
Identify the major features of just-in-time (JIT) production.
Identify several controls relevant to fixed assets and investments.
Distinguish between MRP and MRP II.
Describe several different types of support functions that are typically provided by CADD.
Describe support functions that are typically provided by CAM.
Describe several uses of automatic identification in production activities.
Describe the flow of processing necessary to support manufacturing resource planning (MRP II) systems.
For several years a client's physical inventory count has been lower than what was shown on the books at the time of the count requiring downward adjustments to the inventory account. Contributing to the inventory problem could be weaknesses in internal control that led to the failure to record
Ball Company, which has no perpetual inventory records, takes a monthly physical inventory and reorders any item that is less than its reorder point. On February 5, 20XX, Ball ordered 5,000 units of item A. On February 6, 20XX Ball received 5,000 units of item A, which had been ordered on January
Sanbor Corporation has an inventory of parts consisting of thousands of different items of small value individually but significant in total. Sanbor could establish effective internal accounting control over the parts by requiring(a) approval of requisitions for inventory parts by a company
To achieve effective internal accounting control over fixed-asset additions, a company should establish procedures that require(a) capitalization of the cost of fixed-asset additions in excess of a specific dollar amount.(b) performance of recurring fixed-asset maintenance work solely by
Which of the following is an internal accounting control weakness related to factory equipment?(a) Checks issued in payment of purchases of equipment are not signed by the controller.(b) All purchases of factory equipment are required to be made by the department in need of the equipment.(c)
Which of the following internal accounting control procedures could best prevent direct labor from being charged to manufacturing overhead?(a) reconciliation of work-in-process inventory with cost records(b) comparison of daily journal entries with factory labor summary(c) comparison of periodic
Which of the following is a question the auditor would expect to find on the production cycle section of an internal accounting control questionnaire?(a) Are vendors' invoices for raw materials approved for payment by an employee who is independent of the cash disbursements function?(b) Are signed
Which of the following is the most important element of internal control relating to the raw materials inventory of a manufacturing company?(a) The physical-inventory count should be made by personnel independent of the inventory custodians.(b) Materials from vendors should be received directly by
A well-functioning system of internal control over the inventory/production functions would provide that finished goods are to be accepted for stock only after presentation of a completed production order and a(n)(a) shipping order.(b) material requisition.(c) bill of lading.(d) inspection report.
If preparation of a periodic scrap report is essential in order to maintain adequate control over the manufacturing process, the data for this report should be accumulated in the(a) accounting department.(b) production department.(c) warehousing department.(d) budget department.
Which of the following is (are) a typical example of batch processing?(a) processing weekly time reports to produce paychecks(b) processing groups of checks to update accounts payable files(c) both a and b(d) neither a nor b
Accumulating source documents into groups prior to processing is a characteristic of ( _____________ ).(a) batch processing(b) on-line, real-time processing(c) both a and b(d) neither a nor \(b\)
Which of the following errors would probably be corrected by key verification of data input?(a) A salesperson manually enters an incorrect product number on a sales invoice, which is subsequently given to a data entry operator in the information systems department for key transcription to
Which of the following controls would prevent this situation? Due to transposed letters in his department identification code, a worker's paycheck was incorrectly processed. Instead of "CAB," he entered "ABC," an invalid code.(a) control total(b) limit test(c) internal label check(d) table-lookup
The "son-father-grandfather" concept of backing up master files can be used when master files are stored on ( _____________ ).(a) magnetic tape(b) magnetic disk(c) both a and b(d) neither a nor b
A review of an EDP' system reveals the following items. Which of these is a potential internal control weakness?(a) Backup master files are stored in a remote location.(b) Users must verbally approve all changes to be made to application programs.(c) Computer operators have restricted access to
For control purposes, data clerks total up the employee social security numbers in each batch of payroll transactions. Which of the following terms best describes the resulting total?(a) hash total(b) financial total(c) parity total(d) record count
In an on-line computer system, which of the following may be used to ensure that users have proper authorization to perform a task?(a) check digits(b) passwords(c) control totals(d) limit tests
For control purposes, data clerks total up the employee gross pay amounts in each batch of payroll transactions. Which of the following terms best describes the resulting total?(a) hash total(b) financial total(c) parity total(d) record count
A customer inadvertently orders part number 1234-8 instead of 1243-8. Which of the following controls would detect this error during processing?(a) hash total(b) financial total(c) limit check(d) check digit
Describe program data editing. Is program data editing necessary if input data has been key-verified? Explain.
Identify and describe several program data editing techniques.
Describe how the loss of paper-based internal controls can be compensated for in paperless input systems.
Give an example of automatic identification in a paperless input system that requires human intervention.
Give an example of a paperless input system that requires no human intervention.
Describe batch processing of transactions in a paper-based processing system. When is batch processing most economical?
What type of EDP system is characterized by data that are assembled from more than one location and records that are updated immediately?(a) microcomputer system(b) minicomputer system(c) batch processing system(d) on-line, real-time system
An EDP technique that collects data into groups to permit convenient and efficient processing is known as(a) document-count processing.(b) multiprogramming.(c) batch processing.(d) generalized-audit processing.
What is the computer process called when data processing is performed concurrently with a particular activity and the results are available soon enough to influence the particular course of action being taken or the decision being made?(a) real-time processing(b) batch processing(c) random-access
The real-time feature normally would be least useful when applied to accounting for a firm's(a) bank account balances.(b) property and depreciation.(c) customer accounts receivable.(d) merchandise inventory.
An internal administrative control sometimes used in connection with procedures to detect unauthorized or unexplained computer usage is(a) maintenance of a computer tape library.(b) use of file controls.(c) maintenance of a computer console log.(d) control over program tapes.
A procedural control used in the management of a computer center to minimize the possibility of data or program file destruction through operator error includes(a) control figures.(b) cross-footing tests.(c) limit checks.(d) external labels.
In designing a payroll system, it is known that no individual's paycheck can amount to more than \(\$ 300\) for a single week. As a result, the payroll program has been written to bypass writing a check and will print out an error message if any payroll calculation results in more than \(\$ 300\).
Where disk files are used, the grandfather-father-son updating backup concept is relatively difficult to implement because the(a) location of information points on disks is an extremely time-consuming task.(b) magnetic fields and other environmental factors cause off-site storage to be
A customer inadvertently ordered part number 12368 rather than part number 12638. In processing this order, the error would be detected by the vendor with which of the following controls?(a) batch total(b) key verifying(c) self-checking digit(d) an internal consistency check
In the weekly computer run to prepare payroll checks, a check was printed for an employee who had been terminated the previous week. Which of the following controls, if properly utilized, would have been most effective in preventing the error or ensuring its prompt detection?(a) a control total for
Accounting functions that are normally considered incompatible in a manual system are often combined in an EDP system by using an EDP program or a series of programs. This necessitates an accounting control that prevents unapproved(a) access to the magnetic tape library.(b) revisions to existing
Totals of amounts in computer-record data fields that are not usually added for other purposes but are used only for data processing control purposes are called(a) record totals.(b) hash totals.(c) processing data totals.(d) field totals.
The use of a header label in conjunction with magnetic tape is most likely to prevent errors by the(a) computer operator.(b) data entry clerk.(c) computer programmer.(d) maintenance technician.
Where computers are used, the effectiveness of internal accounting control depends, in part, on whether the organizational structure includes any incompatible combinations. Such a combination would exist when there is no separation of the duties between the(a) documentation librarian and the
The basic form of backup used in magnetic tape operations is called(a) odd parity check.(b) dual-head processing.(c) file protection rings.(d) the son-father-grandfather concept.
An effective control designed to provide reasonable assurance that hourly payroll information has been entered accurately into the computer system is to(a) establish the use of batch-control totals for total hours to be processed.(b) review the contents of the computer master file.(c) limit access
Carmela Department Stores has a fully integrated EDP accounting system and is planning to issue credit cards to creditworthy customers. To strengthen internal control by making it difficult for one to create a valid customer account number, the company's independent auditor has suggested the
One of the major problems in an EDP system is that incompatible functions may be performed by the same individual. One compensating control for this is use of(a) a tape library.(b) a self-checking digit system.(c) computer-generated hash totals.(d) a computer log.
The primary documentation upon which a company should rely for an explanation of how a particular program operates is the(a) run manual.(b) periodic memory dump.(c) maintenance of three generations of master files.(d) echo check printout.
The use of external labels in conjunction with magnetic tape storage is most likely to prevent errors that might be made by which of the following?(a) a computer programmer(b) a systems analyst(c) a data entry clerk(d) a computer operator
An on-line sales order processing system most likely would have an advantage over a batch sales order processing system by(a) detecting errors in the data entry process more easily by the use of edit programs.(b) enabling shipment of customer orders to be initiated as soon as the orders are
Which of the following is a general control that would most likely assist an entity whose systems analyst left the entity in the middle of a major project?(a) grandfather-father-son record retention(b) input and output validation routines(c) systems documentation(d) check digit verification
Consider the following numerical input data utilized in an accounts receivable application:Required (a) For the above data, calculate an example of each of the following: hash total, financial total, record count.(b) You are to design an edit program that will be used to screen the above data
Which of the following functions is not a user in the systems development process?(a) information systems(b) sales(c) production(d) accounting
Which of the following functions works directly with users to identify their specific information requirements:(a) operations(b) systems design(c) systems analysis(d) programming
An analysis that is undertaken to determine the value of further considering a project is called ( __________ ).(a) information assessment(b) project acceptability(c) a feasibility study(d) information analysis
The document that provides a narrative description of a proposed system's operational characteristics is called ( __________ ) .(a) user specifications(b) conceptual design(c) an operating schedule(d) a feasibility study
What document is a translation of the conceptual design into the detailed systems performance and functional specifications necessary to begin the physical design of the system?(a) logical flow diagram(b) user specification(c) systems analysis report(d) systems design report
Which of the following tools is central to the application of CASE (computeraided software engineering) technology?(a) repository(b) project management(c) diagramming tools(d) syntax verifiers
The ability of objects from different classes to respond in their own appropriate manner to common messages is called ( __________ ).(a) encapsulation(b) class action(c) polymorphism(d) inheritance
The process of extracting reusable code segments from existing software and then restructuring this code to enhance its efficiency and reusability is known as ( __________ ).(a) prototyping(b) reengineering(c) polymorphism(d) structured programming
The project team leader for a systems development project should have direct responsibility to the ( __________ ).(a) user department(b) information systems department(c) steering committee(d) project lead analysts
Which of the following is a characteristic of structured programming (SP)?(a) modular program code(b) polymorphism(c) bottom-up design(d) multiple entry and exit points
Identify some user-related problems that have historically plagued the development of computer-based information systems.
Identify several systems development practices in each of the following areas:(a) documentation standards(b) analyst/programmer productivity(c) maintenance and program change(d) database administration(e) audit involvement in systems development
Showing 1500 - 1600
of 5294
First
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Last
Step by Step Answers