New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
accounting information systems
Accounting Information Systems 6th Edition James A. Hall - Solutions
REA Associations Based on the data in Problem 2, which of the following relationships in the next page properlymodels the entity associations for Bentley Restorations? Explain your answer. A B Problem: 3 REA Associations D Sell Auto Sell Auto Sell Auto Sell Auto Receive Cash Receive Cash Receive
REA Associations Based on the data in Problem 2, which of the relationships below properly models the entity associations for this situation? Explain your answer. A Sell B Sell C Sell Problem: 4 REA Associations + Customer Customer Customer D Sell |||+ +Customer
REA Model Extract Prepare an REA model depicting the issuance of raw materials into the manufacturing process.Identify the resource, event, and agent entities. Show the cardinalities in the associations between entities.
REA Model—Horizon Books Horizon Books is a bookstore in downtown Philadelphia. It carries an inventory of approximately 5,000 books. Customers come in and browse the shelves, select their books, and take them to the cashier. At the cashier’s desk, they can also discover whether a particular
REA Model—Feinman Computers Feinman Computers sells desktop computer systems that it manufactures from parts and software that third-party vendors provide. Customers are both private consumers and small businesses. Consumers pay cash or by credit card, but business customers buy on credit. A
REA Model—K Cannon, Inc.K Cannon, Inc., is a manufacturer of portable CD players. The company purchases raw materials such as plastics and computer chips for its conversion cycle. The following describes K Cannon’s purchases and payments procedures.John, the purchasing department clerk,
REA Model—Payroll System Every two weeks, employees for a manufacturing firm submit their time cards to the supervisor, who reviews and approves them. They are the submitted to the payroll department.At that time, the human resources clerk also submits a personnel action to the payroll clerk. The
REA Model—Fixed Asset System Asset acquisition begins when the department manager recognizes the need to obtain or replace an existing fixed asset. The manager prepares two copies of a purchase requisition;one is filed in the department, and one is sent to the purchasing department. The
What is the client-server model?
Describe the two-tier client-server model.
Describe the three-tier client-server model.
What is bolt-on software?
What is data mining?
What is the drill-down approach?
Closed database architecture isa. a control technique intended to prevent unauthorized access from trading partners.b. a limitation inherent in traditional information systems that prevents data sharing.c. a data warehouse control that prevents unclean data from entering the warehouse.d. a
Which statement is most correct?a. SAP is more suited to service industries than manufacturing clients.b. J.D. Edwards’s ERP is designed to accept the best practices modules of other vendors.c. Oracle evolved from a human resources system.d. PeopleSoft is the world’s leading supplier of
Data Warehouse Access Control You are the CEO of a large organization that implemented a data warehouse for internal analysis of corporate data. The operations manager has written you a memo advocating opening the data warehouse to your suppliers and customers. Explain any merit to this
Project Implementation Your organization is planning to implement an ERP system. Some managers in the organization favor the big bang approach. Others are advocating a phased-in approach.The CEO has asked you, as project leader, to write a memo summarizing the advantages and disadvantages of each
Selecting a Consultant You are the chief information officer for a midsized organization that has decided to implement an ERP system. The CEO has met with a consulting ERP firm based on a recommendation from a personal friend at his club. At the interview, the president of the consulting firm
Auditing ERP Databases You are an independent auditor attending an engagement interview with the client. The client’s organization has recently implemented a data warehouse. Management is concerned that the audit tests that you perform will disrupt operations. It suggests that instead of running
Big Bang vs. Phased-in The Nevada Department of Motor Vehicles is the agency responsible for licensing both drivers and vehicles in the state of Nevada. Until recently, legacy systems were used for both licensing needs. The legacy system for driver’s licenses maintained the following information
ERP Failure When an ERP implementation fails, who is to blame? Is it the software manufacture, the client firm, or the implementation strategy?Required:Research this issue and write a brief paper outlining the key issues.
ERP Market Growth Because many large corporations implemented ERP systems prior to 2000, what direction will growth of the ERP market take?Required:Research this issue and write a brief paper outlining the key issues.
ERP Consultants Do an Internet search of complaints about ERP consultants. Write a report about the most common complaints and cite examples.
ERP Bolt-on Software Go to 10 websites of companies that supply bolt-on software. Write a report containing URLs that briefly describes the software features and its compatibility with specific ERP systems.
1. What is the purpose of the TCP portion of TCP/IP?
What is XML?
What is XBRL?
Which of the following statements is true?a. Cookies were originally intended to facilitate advertising on the web.b. Cookies always contain encrypted data.c. Cookies are text files and never contain encrypted data.d. Cookies contain the URLs of sites the user visits.e. Web browsers cannot function
A DDos attacka. is more intensive than a Dos attack because it emanates from single source.b. may take the form of either a SYN flood or smurf attack.c. is so named because it affects many victims simultaneously, which are distributed across the Internet.d. turns the target victim’s computers
1. A ping signal is used to initiatea. URL masquerading.b. digital signature forging.c. Internet protocol spoofing.d. a smurf attacke. a SYN-ACK packet.
Encryption The coded message that follows is an encrypted message from Brutus to the Roman Senate. It was produced using the Caesar cipher method, in which each letter is shifted by a fixed number of places (determined by the key value).OHWV GR MXOLXV RQ PRQGDB PDUFK 48 GUHVV: WRJD FDVXDO
Encryptiona. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. Variations on this are limitless.b. Select a single-digit key.c. Code
Seals of Assurance Visit 10 websites that sell products or services and record the following for each:a. The URL.b. Did the site issue you a cookie?c. Did the site have a published privacy policy?d. Does the site reserve the right to distribute or sell customer data?e. Does the site use encryption
1. Certification Authority Licensing Research the current state of certification authority licensing in the United States and Europe. Write a brief report of your findings.
Privacy Visit 10 websites that sell products or services and record the URL of each. Evaluate each site’s published privacy policy in terms of the conditions needed for compliance with the Safe Harbor Agreement. Write a report of your findings.
Electronic Data Interchange The purchase order for one firm is the source document for the sales order of another firm.Consider the following purchase order and sales order data elements stored for two firms. Discuss any differences that may be problematic in transferring information between the
Internal Controls Assessment and Electronic Data Interchange: Gresko Toys Factory(Prepared by Robertos Karahannas, Lehigh University)Mr. and Mrs. Gresko started Gresko Toys in the early 1960s. Initially, the company was small and few toys were produced. The talent and skills of Mr. Gresko were by
Electronic Fraud In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million.Several employees in collusion with the former deputy tax collector completely erased or reduced $13 million in property taxes and$7 million in
Santa’sAttic.com Santa’sAttic.com is an online retailer/manufacturer of children’s toys. Its main competitors are larger electronic commerce toy companies including Amazon.com; Yahoo Shopping, which includes ToysRUs.com and KBKids.com; and all of the other retail stores with online shopping.
1. What are the primary fact-gathering techniques?
1. What is the primary objective of conceptual design?
1. What is the accountant’s primary role in conceptual design?
1. Distinguish between tangible and intangible benefits.
A feasibility study for a new computer system shoulda. consider costs, savings, controls, profit improvement, and other benefits analyzed by application area.b. provide the preliminary plan for converting existing manual systems and clerical operations.c. provide management with assurance from
Which of the following is the most important factor in planning for a system change?a. Having an auditor as a member of the design team.b. Using state-of-the-art techniques.c. Concentrating on software rather than hardware.d. Involving top management and people who use the system.e. Selecting a
In the context of the TELOS acronym, technical feasibility refers to whethera. a proposed system is attainable, given the existing technology.b. the systems manager can coordinate and control the activities of the systems department.c. an adequate computer site exists for the proposed system.d. the
Which of the following steps is NOT considered to be part of this systems survey?a. Interviews are conducted with operating people and managers.b. The complete documentation of the system is obtained and reviewed.c. Measures of processing volume are obtained for each operation.d. Equipment sold by
A systems development approach that starts with broad organizational goals and the types of decisions organizational executives make is calleda. bottom-up.b. network.c. top-down.d. strategic.e. sequential.
The TELOS study that determines whether a project can be completed in an acceptable time frame isa. a schedule feasibility study.b. a time frame feasibility study.c. an on-time feasibility study.d. an economic completion feasibility study.e. a length of contract feasibility study.
The TELOS acronym is often used for determining the need for system changes. Which of the following types of feasibility studies are elements of TELOS?a. legal, environmental, and economicb. environmental, operational, and economicc. technical, economic, legal, and practicald. practical, technical,
What name is given to the time value of money technique that discounts the after-tax cash flows for a project over its life to time period zero using the company’s minimum desired rate of return?a. net present value methodb. capital rationing methodc. payback methodd. average rate of return
Which of the following aspects of a cost-benefit study would have the greatest uncertainty as to its precise value?a. the tangible costsb. the intangible costsc. the tangible benefitsd. the intangible benefitse. none of the above because they are equally precise
Systems Planning A new systems development project is being planned for Reindeer Christmas Supplies Company.The invoicing, cash receipts, and accounts payable modules are all going to be updated.The controller, Kris K. Ringle, is a little anxious about this project. The last systems development
Problem Identification Classify each of the following as a problem or a symptom. If it is a symptom, give two examples of a possible underlying problem. If it is a problem, give two examples of a possible symptom that may be detected.a. declining profitsb. defective production processc. low-quality
Systems Development and User Involvement Kruger Designs hired a consulting firm three months ago to redesign the information system that the architects use. The architects will be able to use state-of-the-art computer-aided design (CAD) programs to help in designing the products. Further, they will
Fact-Gathering Techniques Your company, Tractors, Inc., is employing the SDLC for its new information system. You have been chosen as a member of the development team because of your strong accounting background. This background includes a good understanding of both financial and managerial
Systems Selection Your company, Kitchen Works, is employing the SDLC for its new information system. The company is currently performing a number of feasibility studies, including the economic feasibility study. A draft of the economic feasibility study has been presented to you for your review.You
Cost-Benefit Analysis Listed on the next page are some probability estimates of the costs and benefits associated with two competing projects.a. Compute the net present value of each alternative. Round the cost projections to the nearest month. Explain what happens to the answer if the
Balanced Scorecard An organization’s IT function has the following goals:• Improve the quality of IT solutions and services to its internal users.• Increase the ratio of planned-to-realized benefits from systems solutions.• Fully match IT strategy with enterprise strategies.• Integrate
SOX contains many sections. Which sections are the focus of this chapter?
Which of the following is NOT a requirement in management’s report on the effectiveness of internal controls over financial reporting?a. A statement of management’s responsibility for establishing and maintaining adequate internal control user satisfaction.b. A statement that the
Which of the following is NOT an implication of Section 302 of SOX?a. Auditors must determine whether changes in internal control have, or are likely to, materially affect internal control over financial reporting.b. Auditors must interview management regarding significant changes in the design or
Which of the following risks does the auditor least control?a. inherent riskb. control riskc. detection riskd. all are equally controllable
Internal Control Gustave, CPA, during its preliminary review of the financial statements of Comet, Inc., found a lack of proper segregation of duties between the programming and operating functions.Comet owns its own computing facilities.Gustave diligently intensified the internal control study and
Separation of Duties Transferring people from job to job within the organization is the philosophy at Arcadia Plastics.Management feels that job rotation deters employees from feeling that they are stagnating in their jobs and promotes a better understanding of the company. The computer services
Disaster Recover Service Providers Visit SunGard’s website, http://www.sungard.com, and research its recovery services offered for the following classes: High Availability, System Recovery, and End-User Recover.Write a report of your findings.
Internal Control and Distributed System Until a year ago, Dagwood Printing Company had always operated in a centralized computer environment. Now, 75 percent of the office employees have a PC. Users have been able to choose their own software packages, and no documentation of end-user-developed
1.. What are the most common forms of contra security behavior?
1.. Explain how a Trojan horse may be used to penetrate a system.
1.. What are some tests of data communications controls?
1.. Does every organization that has a LAN need a firewall?
1.. Describe three ways in which IPS can be used to protect against DDos attacks.
1.. An integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n)a. operating system.b. database management system.c. utility system.d. facility system.e. object system.
1.. Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully captures
1.. Operating System and Network Control Describe a well-controlled system in terms of access controls for a major insurance company that equips each salesperson (life, property, and investments) with a laptop. Each salesperson must transmit sales data daily to corporate headquarters.Further, the
Operation System Controls In 2002, Mr. Rollerball started Mighty Mouse, Inc., a small, 75-employee firm that produces and sells wireless keyboards and other devices to vendors through its manufacturing plant in Little Rock, Arkansas. In its first two years of business, MM saw a substantial growth
Internal Control and Fraud Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 pm unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties.He has been accessing the system from his home during
Input Controls and Networking A global manufacturing company has over 100 subsidiaries worldwide reporting to it each month. The reporting units prepare the basic financial statements and other key financial data on prescribed forms, which are e-mailed or faxed to the corporate headquarters.The
Preventive Controls Listed below are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a preventive control.a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. (The
Operating System Exposures and Controls Listed below are five scenarios. For each scenario, discuss the potential consequences and give a prevention technique.a. The systems operator opened a bag of burned microwave popcorn directly under a smoke detector in the computing room where two mainframes,
Database Authorization Table The following information is stored in two relational database files:Employee Master File Social Security number Name Address Date hired Hourly wage rate Marital status Number of exemptions Weekly Payroll Social Security number Hours worked Deductions Bonuses
Security and Control Assessment Brew Bottle Company (BBC) is in the process of planning a more advanced computer-based information system. Slavish & Moore, LLP, BBC’s consulting firm, have recently been provided with an overview of their proposed plan:The Brew Bottle Company Information System
What is a run-to-run control?
1.. Explain how an embedded audit module works.
Input Validation Describe the types of application control used for the following data in a payroll system.a. Employee nameb. Employee numberc. Social Security numberd. Rate per hour or salarye. Marital statusf. Number of dependents g. Cost center h. Regular hours worked i. Overtime hours worked j.
Computer Fraud and Controls Although the threat to security via external penetration is often seen as the greatest threat, many threats are internal. Computer frauds include (1) input manipulation, (2) program alteration, (3) file alteration, (4) data theft, and (5) sabotage.Required:Explain how
Processing Controls A well-designed system can prevent both intentional and unintentional alteration and destruction of data. These data controls can be classified as (1) input controls, (2) processing controls, and (3) output controls Required:For each of the three control categories listed,
Input Controls and Data Processing A catalog company has hired you to computerize its sales order entry forms. Approximately 60 percent of all orders are received over the telephone, with the remainder received by either mail or fax. The company wants the phone orders to be input as they are
Audit Plan Rainbow Paint Company, a medium-sized manufacturing firm, has no internal auditing department. It recently hired a new accounting firm to perform the external audit.Required:Outline an audit plan to examine operating system control, program maintenance controls, and organizational system
Audit Plan The auditors for Golden Gate Company have a gut feeling that liabilities may be unrecorded. Their initial suspicions stem from a radical decline in accrued liabilities from last year. Golden Gate’s records are all computerized.Required:Devise a plan to search the data files to perform
Risk Identification and Plan of Action Two years ago, an external auditing firm supervised the programming of embedded audit modules for Previts Office Equipment Company. During the audit process this year, the external auditors requested that a transaction log of all transactions be copied to the
Risk Identification and Plan of Action The internal auditors of Brown Electrical Company report to the controller. Due to changes made in the past year to several of the transaction processing programs, the internal auditors created a new test data set.The external auditors requested that the old
Risk Identification and Plan of Action As the manager of the external audit team, you realize that the embedded audit module only writes material invoices to the audit file for the accounts receivable confirmation process.You are immediately concerned that the accounts receivable account may be
Audit Objectives and Procedures You are conducting substantive tests on the accounts receivable file to verify its accuracy.The file is large, and you decide to test only a sample of the records. Because of the complexity of the database structure, you cannot access the database directly. The
Systems Development and Program Changes Avatar Financials, Inc., located on Madison Avenue in New York, is a company that provides financial advice to individuals and small to mid-sized businesses. Its primary operations are in wealth management and financial advice. Each client has an account
Computer-Assisted Audit Tools and Techniques (CAATTs)Required:a. Explain the advantages of using GAS to assist with audits and give several examples of how it may be used.b. Describe the audit purpose facilitated and the procedural steps to be followed when using the following CAATTs.1. ITF 2. EAM
Audit of Systems Development The Balcar Company’s auditors are developing an audit plan to review the company’s systems development procedures. Their audit objectives are to ensure that 1.the system was judged necessary and justified at various checkpoints throughout the SDLC.2.systems
Payroll Application Control Using this supplemental information, analyze the flowchart on the following page.• The personnel department determines the wage rate of all employees. To start the process, personnel sends the payroll coordinator, George Jones, an authorization form in order to add an
Which type of control is considered a compensating control?a. segregation of dutiesb. access controlc. supervisiond. accounting records
Showing 100 - 200
of 5294
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers