New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
accounting information systems
Accounting Information Systems 8th Edition George H. Bodnar, William S. Hopwood - Solutions
A company holds bearer bonds as a short-term investment. Custody of these bonds and submission of coupons for interest payments normally is the responsibility of the(a) treasury function.(b) legal counsel.(c) general-accounting function.(d) internal-audit function.
Operating control of the check-signing machine normally should be the responsibility of the(a) general-accounting function.(b) treasury function.(c) legal counsel.(d) internal-audit function.
Internal control over cash receipts is weakened when an employee who receives customer mail receipts also(a) prepares initial cash receipts records.(b) records credits to individual accounts receivable.(c) prepares bank deposit slips for all mail receipts.(d) maintains a petty cash fund.
For good internal control, the monthly bank statements should be reconciled by someone under the direction of the(a) credit manager.(b) controller.(c) cashier.(d) treasurer.
For good internal control, the person who should sign checks is the(a) person preparing the checks.(b) purchasing agent.(c) accounts payable clerk.(d) treasurer.
For good internal control, the credit manager should be responsible to the (a) sales manager.(b) customer service manager.(c) controller.(d) treasurer.
The authorization for write-off of accounts receivable should be the responsibility of the(a) credit manager.(b) controller.(c) accounts receivable clerk.(d) treasurer.
In general, material irregularities perpetrated by which of the following are most difficult to detect?(a) cashier(b) controller(c) internal auditor(d) data entry clerk
A well-designed system of internal control that is functioning effectively is most likely to detect an irregularity arising from(a) the fraudulent action of several employees.(b) the fraudulent action of an individual employee.(c) informal deviations from the official organization chart.(d)
To provide for the greatest degree of independence in performing internal auditing functions, an internal auditor most likely should report to the(a) financial vice president.(b) corporate controller.(c) board of directors.(d) corporate stockholders.
The use of fidelity bonds may indemnify a company from embezzlement losses. The use also(a) reduces the company's need to obtain expensive business interruption insurance.(b) protects employees who made unintentional errors from possible monetary damages resulting from such errors.(c) allows the
For good internal control, which of the following functions should not be the responsibility of the treasurer's department?(a) data processing(b) handling of cash(c) custody of securities(d) establishment of credit policies
Which of the following sets of duties would ordinarily be considered basically incompatible in terms of good internal control?(a) preparation of monthly statements to customers and maintenance of the accounts receivable subsidiary ledger (b) posting to the general ledger and approval of additions
The Foreign Corrupt Practices Act requires that(a) auditors engaged to examine the financial statements of publicly held companies report all illegal payments to the SEC.(b) publicly held companies establish independent audit committees to monitor the effectiveness of their system of internal
Establishing and maintaining a system of internal accounting control is the primary responsibility of(a) management and the board of directors.(b) the internal auditor.(c) the external auditor.(d) a financial analyst.(e) the data processing manager.
Collusion appears to be ( __________ ) in a computerized versus manual system.(a) less likely(b) more likely(c) equally likely
Which of the following is an active threat to computer security?(a) computer sabotage(b) earthquake(c) equipment failures(d) power outages
Individuals who attack computer systems for fun and challenge are sometimes called ( __________ ).(a) duffers(b) geeks(c) hackers(d) flaggers
The interception of legitimate information and substitution of fraudulent information in its place is called ( __________ ).(a) EMI eavesdropping.(b) flagging(c) hacking(d) piggybacking
In most cases of computer fraud, ( __________ ) is the method used.(a) program alteration(b) input manipulation(c) direct file alteration(d) misappropriation or theft of computer resources
A destructive computer program masquerading as a legitimate one is called a ( __________ ) .(a) trapdoor(b) logic bomb(c) Trojan horse(d) worm
Five employees were accused of using their employer's mainframe computer during slack hours to operate their own data processing firm. This is an example of ( __________ ).(a) program alteration(b) input manipulation(c) direct file alteration(d) misappropriation or theft of computer resources
An alternate computer processing site that contains the necessary wiring and computer equipment for operation, but not data files, is called a ( __________ ).(a) hot site(b) cold site(c) flying-start site(d) fault-tolerant site
Marking and locking out a disk or DASD sector so that it will not be used again after it has been found to be unreliable is called ( __________ ).(a) hacking(b) flagging(c) disk shadowing(d) disk mirroring
A dormant piece of code placed in a computer program for later activation by a specific event is a ( __________ ).(a) trapdoor(b) logic bomb(c) Trojan horse(d) worm
Identify several unique problems and risks associated with computerized information networks.
What elements are included in a computer security system?
Does the development of a computer security system require application of the life-cycle approach? Discuss.
Identify some of the general types of threats that affect computer systems.
Is it possible to rigorously identify characteristics of the white-collar criminal?
What types of individuals pose a threat to a computer system?
Identify several different types of intruders.
Identify and discuss six different methods that an individual might use to perpetrate a computer fraud.
How might computer programs be used to commit acts of sabotage?
Describe the layered approach to access control. What specific layers of access control might be implemented?
Identify several recovery strategies and procedures that might be included in a disaster recovery plan.
The Randell Company is a medium-sized toy manufacturer. The information services division of this company is composed of user services, systems programming, and systems maintenance. In addition, the company has a batchoriented accounts receivable system. All the databases related to accounts
Green Manufacturing maintains a large computer systems division. The company has recently faced a major problem with its software. It seems that ever since one of the computer programmers has been fired, disk files are mysteriously being erased. The chief analyst suspects that the fired programmer
A programmer in the Ace Bottle Company installs a patch in one of the computer's billing routines that skips over the billing of a friend's account. The program allows the account balance to increase without bounds. Another patch was put into the program to ensure that the friend's account balance
If customers pay for each sales transaction with a separate check and are not permitted to make installment payments on any sales, then the relationship between the Sales and Cash Receipt events would be modeled as being which of the following?a. 1:1c. M:Nb. 1:Nd. 0:N
Why is it not necessary to model activities such as mailing invoices to customers and recording invoices received from suppliers as events in an REA diagram?
Develop a data model of Fred’s Train Shop’s expenditure cycle activities related to the acquisition of office equipment and other fixed assets. Assume that Fred makes installment payments for most fixed-asset acquisitions, but occasionally pays for some equipment in full at the time of
Which of the following types of entities must become a separate table in a relational database?a. resourcesc. agentsb. eventsd. all of the above
Which type of relationship cardinality must be implemented in a relational database as a separate table?a. 1:1 relationshipc. M:N relationshipb. 1 :N relationshipd. all of the above
Combining two REA diagrams by merging entities common to both will necessitate changes in cardinality pairs associated with the merged entity if it is a(n)a. resourcec. agentb. eventd. all of the above
Information traditionally found in journals is stored in which type of entity in an REA database?a. resourcec. agentb. eventd. all of the above
The primary key of a M;N relationship between the Receive Inventory and Cash Disbursement events would bea. receiving report numberb. check numberc. both receiving report number and check numberd. none of the above
In a relational database designed according to the REA data model, information traditionally stored in ledgers can be obtained by queryinga. resourcesc. agentsb. eventsd. all of the above
The ABC Company sells mass-produced items to retail stores on credit. At the beginning of each month, ABC sends each customer a monthly statement that lists all sales transactions for the previous month. Customers must pay by the 20th of the month. If they have not paid by then, they will not be
Describe the different types of electronic networks and contrast the differences between them.
Summarize the development of the Internet.
Explain the security risks inherent in any intranet.
Explain how addressing works on the Internet.
Summarize any differences between firewalls and proxy servers. In what situations would both be used?
How might EDI (electronic data interchange) be implemented on a commerce server?
Define and describe several different types of servers used in electronic commerce.
Discuss one or two different types of hacker attacks that might be made against a commerce server.
If two companies did electronic business with each other on a regular basis, would they need to exchange digital certificates with each new transaction? Why or why not?
Summarize any advantages of public-key encryption over secret-key encryption.
What would a hacker have to do to forge a digital signature? How can such an attack be prevented?
Why do message digests normally have a fixed length?
Why might the message digesting function be the target of an attack for a hacker?
Discuss the relative advantages and disadvantages of digital signatures versus traditional signatures.
What security issues might exist in maintaining a certificate revocation list?
Tireco is a medium-sized firm that manufactures and distributes specialty tires. The company has good separation of duties, and at the top of the organization chart is the president, controller, vice president of manufacturing, vice president of marketing, and the finance officer. Under the vice
All clear Company is a large manufacturer of custom draperies. In all, the company has seven divisions spread out across the country. Furthermore, the company has adopted a policy of issuing digital certificates for all company transactions, and it has even decided to issue digital credentials for
Given the information in the previous question, analyze and criticize the information that is issued with the purchasing officer's credentials.Question 20All clear Company is a large manufacturer of custom draperies. In all, the company has seven divisions spread out across the country.
GGG Company has entered into a contract with its financial institution that would allow it to issue its own digital cash. GGG would create sequenced notes that would be digitally signed with one of several private keys. The exact keys used would depend on the denominations of the individual
What is the binary (base 2 ) representation of the following base 10 (decimal) values?(a) 7(b) 13(c) 28(d) 71(e) 93(f) 428
Compute the decimal (base 10) equivalents of the following binary (base 2 ) numbers:(a) 111000(b) 101010(c) 100111
Discuss whether or not computer output microfilming (COM) would be appropriate in the following situations:(a) filing name and address changes on a customer mailing list.(b) storing canceled checks and bank statements.(c) storing charge sales slips.
A disk has 200 cylinders. There are ten recording surfaces per disk pack and each track can hold 7,200 bytes.(a) What is the maximum capacity of each cylinder? Of the entire disk pack?(b) Assume that a file has 1,200 records, each 600 bytes long. Calculate the following:(1) records per track.(2)
Surveys have indicated that about \(60 \%\) of all computer-related fraud in the government might be attributed to the input of fraudulent data for computer processing. What does this suggest concerning the design of computer-based accounting information systems?
Inventory records will be stored on magnetic tape. The tapes that will be used are 2,400 feet long with a density of 1,600 bytes per inch. The interblock gap is \(0.6 \mathrm{inch}\). The inventory records are a fixed length of 400 bytes each.(a) How many records can be stored on a reel of tape if
Which method of input would you recommend for the following activities? Explain your choice.(a) entering grades for courses(b) entering data from bank checks(c) entering data for payroll calculations(d) entering data from questionnaires(e) entering data for sales transactions(f) entering data for
Distinguish between a mainframe computer, a minicomputer, and a PC. Do you think minicomputers are obsolete? Explain your answer.
Operating systems such as OS/2 and Windows have caused terms such as multitasking, multiuser, and concurrent processing to be applied to PCs. Explain what these capabilities provide to PC users.
Take a field trip to a computer store and evaluate several PC systems that are sold there. Prepare a report comparing the key features and prices of several of the systems. Include such characteristics as CPU word size (e.g., 16- or 32bit), size of main memory, type of disk drives and storage
Take a field trip to a computer store and evaluate several business-oriented PC software packages that are sold there, such as spreadsheet software and database software. Prepare a report comparing the key features and prices of several of the PC software packages.
Take a field trip to the central computer facility at your university. Diagram the hardware configuration of the university's computer system. Include such items as the number of CPUs, disk drive units, tape drive units, printers, data terminals, and communication devices.
Prepare a hardware configuration diagram for each of the following computer systems.(a) A PC system used by an accountant to prepare tax returns and other types of financial reports. The system has a color monitor, a laser printer, two external disk drives, and a \(600-\mathrm{Mb}\) internal hard
Ibex Insurance Corporation has over 2,000 PCs networked locally in its regional offices that are connected over leased telephone lines to mainframe computers in the company's central offices. Ibex originally chose the PCs to function as stand-alone workstations for its employees, but in considering
The universal product code (bar code) that is commonplace on consumer products is a ( ___________ ) .(a) sequential code(b) block code(c) group or hierarchical code(d) decimal code
A journal is ( ___________ ).(a) a chronological listing of transactions(b) similar to a transaction file(c) similar to a reference file(d) a and b
Payroll tax tables would be found in \(a(n)(\) ( ___________ ) file.(a) master(b) open data(c) reference(d) transaction
Which type of file has only temporary significance to management?(a) master(b) open data(c) reference(d) transaction
What sequence of events is pertinent in designing an accounting information system?(a) design inputs, processes, and then outputs(b) design chart of accounts, inputs, and then processes(c) design reports, inputs, and then chart of accounts(d) design reports, chart of accounts, and inputs
Which type of coding scheme allows for the most flexibility?(a) block(b) sequence(c) group(d) decimal
Many data processing systems standardize calendar dating procedures by assigning sequential numbers to dates. This procedure is known as ( ___________ ).(a) decimal dating(b) Julian dating(c) mnemonic dating(d) Gregorian dating
The fundamental consideration(s) in forms design is (are) ( ___________ ).(a) prenumbering, forms control sequence numbers, revision codes, spacing, color, and data layout(b) the number of times a form will be handled, storage time, activity, type of handling, number of copies, and quantity used(c)
Standard journal entries are used to ( ___________ ).(a) document the plan of journalizing recurring transactions(b) document the chart of accounts(c) eliminate the need for adjusting entries(d) eliminate the need for subsidiary ledgers
A writing board system is used to prepare checks for the payment of invoices. The one-writing operation prepares the check and ( ___________ ) .(a) posts the transaction(b) journalizes the transaction(c) both a and b(d) neither a nor b
Which of the following best describes the Internet?(a) developed by Microsoft and IBM(b) highly centralized(c) highly decentralized(d) none of the above
Which of the following is true?(a) The Internet is faster than most local area networks.(b) Most metropolitan networks are faster than the Internet.(c) The speed of the Internet is usually critical in processing single accounting transactions.(d) None of the above.
TCP/IP is ( __________ ) .(a) an approach to networking developed by the RAND Corporation(b) the standard for virtually all long-distance Internet communications(c) the standard protocol for the formatting of Web documents(d) none of the above
Spoofing would be most applicable to ( __________ )(a) a hacker attack(b) a failure in a proxy server(c) the elimination of an access control list(d) none of the above
An FTP server is an example of a ( __________ ).(a) Web server(b) mail server(c) commerce server(d) none of the above
The SET protocol would be most applicable to ( __________ ).(a) a commerce server(b) a Web server(c) a mail server(d) an FTP server
Which approach to encryption is the most secure for a server that deals with many unknown clients?(a) public-key encryption(b) secret-key encryption(c) anonymous encryption(d) none of the above
Which of the following statements is true regarding digital signatures?(a) They require the related message to be encrypted(b) They do not require the related message to be encrypted(c) They require the use of message digests(d) None of the above
Showing 1900 - 2000
of 5294
First
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Last
Step by Step Answers