New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
accounting information systems
Accounting Information Systems 10th Edition James A. Hall - Solutions
Describe the three-tier client-server model.
Which statement is LEAST accurate?a. Implementing an ERP system has more to do with changing the way an organization does business than it does with technology.b. The phased-in approach to ERP implementation is particularly suited to diversified organizations whose units do not share common
Describe the two-tier client-server model.
Which statement is NOT true?a. Drill-down capability is an OLAP feature of data mining tools available to the user.b. The data warehouse should be separate from operational systems.c. Denormalization of data involves dividing the data into very small tables that support detailed analysis.d. Some
What is the client-server model?
What is view integration?
When are data in 3NF?
Let’s Go Camping (LGC) is an outdoor equipment retailer that sells camping, fishing, boating, and other outdoor supplies. It carries an extensive inventory in its store and offers an online search capability for items in its Utah warehouse that are not available in the store. Customers come into
What is view modeling?
The concept of duality means that an REA diagram must consist ofa. Two events—one of them economic and the other, support.b. Two agents—one of them internal and the other, external.c. Two resources—one increased and the other decreased by the same event.d. All of the above.e. None of the
What are economic agents?
What are economic events?
Which of the following tables would most likely have a composite key?a. Take orderb. Ship Goodsc. Inventory-Ship Linkd. Cashe. None of the above
What are economic resources?
What is a user view?
What is a data model?
Prepare an entity relationship diagram for the revenue cycle that includes entities, cardinalities, and reflects the following business rules:Customers place many orders during the periodEach sales order consists of one or more line items of inventory.Customers are billed twice a month for the
Explain how a separate linking table works in a many-to-many cardinality.
Harry Jones, CEO of Halifax Inc., has recently heard a lot about big data analytics, and wants to initiate a data analytics program in the company, which has a substantial volume of historic structured and unstructured data that the company has never properly exploited. Because Halifax lacks the
Which file provides historical financial data for comparative financial reports?a. General ledger history fileb. Journal voucher history filec. Responsibility filed. Budget master file
Name, in order, the 11 steps of the financial reporting process.
Define computer-integrated manufacturing.
What is a value stream map?
Refer to the equation for the EOQ in the text. Car Country, a local Ford dealer, sells 1,280 small SUVs each year. Keeping a car on the lot costs n Car Country $200 per month, so the company prefers to order as few SUVs as is economically feasible. However, each time an order is placed, the company
Which of the following statements regarding traditional accounting is true?a. Traditional accounting does not provide managers in a JIT setting with timely information.b. The financial orientation allows for effective measuring disparate items.c. Overhead allocations may lead to cost distortions.d.
Which statement describes the evolution of enterprise systems?a. MRP II evolved from MRP and MRP II evolved into ERP.b. MRP evolved directly from ERP.c. ERP evolved into MRP and MRP evolved into MRP II.d. None of the above is true.
What is RSA encryption?
Evergreen Corp has recently hired a CIO with progressive ideas regarding relationship management. He did not like the silo effect cause by strict segregations resolve this perceived problem and to create a sense of ownership among the IT staff, the CIO restructured IT operations to include
Which of the following is not true about the SSAE16 report?a. It is a third-party attestation report.b. It replaced Statement on Auditing Standards No. 70 (SAS 70).c. When using the carve-out method, service provider management would exclude the subservice organization’s relevant controls.d. The
The ABC Company is switching from its legacy centralized system to a fully distributed system. Under the new model, all employees will work from PCs connected to a local area network.Requireda. Outline a plan of action to ensure that the proper controls over hardware, software, data, people,
Which of the following is the best example of an application control objective?a. Ensure the validity, completeness, and accuracy of sales transactions.b. Provide backup facilities in the event of a disaster.c. Prevent unauthorized access to corporate databases.d. Ensure that the computer operating
In conducting a cost-benefit analysis, the estimated category that ordinarily would have the least uncertainty as to its precise value is,a. The intangible benefits.b. The intangible costs.c. The tangible benefits.d. The tangible costs.e. None of the above because they are equally precise.
What are the primary fact-gathering techniques?
Which of the following is NOT a one-time cost?a. Insuranceb. Data conversionc. Software acquisitiond. Site preparation
Prepare two alternative conceptual designs for both an accounts payable system and an accounts receivable system. Discuss the differences in concept between the different designs. From a cost perspective, which is more economical? From a benefits perspective, which is more desirable? Which design
Based upon what you have read in this chapter, what might be some of the problems that would account for system failures?
User test and acceptance is part of which phase of the SDLC?a. General systems designb Program specification and implementation planningc. Detailed systems designd. Implementation
What is OSI?
What is Software-as-a-Service (SaaS)?
What is a LAN?
What is a VAN?
What is network virtualization?
What is a cookie?
Define IP spoofing.
The client-server model,a. Is most effective when used as a bus topology, because its deterministic access method avoids collisions and prevents data loss during transmissions.b. Is best suited to the token ring topology, because the random-access method this topology uses detects data
In a financial fraud case, city employees in Brooklyn, New York, accessed digital databases to defraud the city of $20 million. Several employees, in collusion with the former deputy tax collector, completely erased or reduced $13 million in property taxes and $7 million in accrued interest that
A system of computers that connects the internal users of an organization distributed over a wide geographic area is a(n),a. LAN.b. Internet.c. Decentralized network.d. Intranet.e. Multidrop network.
Virtualization technology is credited with unleashing cloud computing. Write an essay explaining virtualizationnand its impact on cloud computing.
A ping signal isa. Used to perpetrate URL masquerading.b. An Internet maintenance tool.c. Used for Internet protocol spoofing.d. An Internet protocol.e. ASYN-ACK packet.
The purchase order for one firm is the source document for the sales order of another firm. Consider the following purchase order and sales order data elements stored for two firms. Discuss any differences that may be problematic in transferring informationbetween the two firms.Purchasing Firm:GH
A message that is contrived to appear to be coming from a trusted or authorized source is calleda. A DDoS attack.b. Digital signature forging.d. URL masquerading.e. Internet protocol spoofing.
Visit 10 websites that sell products or services, andrecord the following for each:a. The URL.b. Did the site issue you a cookie?c. Did the site have a published privacy policy?d. Does the site reserve the right to distribute or sell customer data?e. Does the site use encryption for transmission of
Which of the following statements is correct?a. A virtual private network (VPN) is a private network within a public network.b. Cloud computing allows client firms to acquire IT resources from vendors in strict accordance with long-term contracts that stipulate services.c. A packet combines the
a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. Variations on this are limitless.b. Select a single-digit key.c. Code a short
What is packet switching?
A DDoS attacka. Is more intensive than a Do S attack, because it emanates from a single source.b. Turns the target victim’s computers into zombies that are unable to access the Internet. c. is so named because it affects many victims simultaneously, affects many victims simultaneously,d. May
What is an access control list?
What is the drill-down approach?
Who below is most likely to distribute paychecks?a. Paymasterb. Timekeeping clerkc. Personnel clerkd. Supervisor
In 2002, Thomas Turner opened the doors of Turner Patio Furniture (TPF) in Marysville, Pennsylvania. The company, which began with only 3 employees (Thomas and his two sons), has grown over a decade from a small business serving the local community into a privately held corporation that supports
Which of the following is not a payroll system internal control?a. Supervisors verify the accuracy of employee time cards.b. The personnel department submits a personnel action form to the payroll department.c. Paychecks are distributed by an independent paymaster.d. The accounts payable department
Which one of the following functions is responsible for submitting employee pay rate changes?a. Payrollb. Treasurerc. Cash disbursementsd. Personnele. None of the above
Which control helps to ensure that the inventory items received are the correct type and the correct amount, and are in good condition?a. Reconciliation with the packing slipb. The way matchc. Preparation of a shipping noticed. Issuance of a blind copy of purchase order
What assets are at greatest risk in a POS system?
Why was EDI devised?
What is multilevel security?
Discuss the trade-off in choosing to update the general ledger accounts in real time versus batch.
Which document triggers the billing function?a. Shipping noticeb. Customer orderc. Bill of ladingd. Sales order
Which of the following is often called a compensating control?a. Supervisionb. Access controlc. Segregation of dutiesd. Accounting records
How can we prevent inventory from being reordered automatically each time the system detects a low inventory level?
Which of the following sets of tasks should not be separated?a. Processing customer sales orders and approving creditb. Receiving cash and updating the accounts receivable subsidiary ledgerc. Storing inventory in the warehouse and updating the inventory stock records for internal usedd. Processing
What is the purpose of physical controls?
The bill of lading is prepared by the,a. Sales clerk.b. Warehouse clerk.c. Shipping clerk.d. Billing clerk.
Which control helps to ensure that the inventory items shipped to the customer are the correct type and the correct amount?a. Three way matchb. Reconciliation of Bill Lading and receiving reportc. Issuance of a blind copy of purchase orderd. Reconcile stock release document and packing slip
Which functions should be segregated?a. Authorizing credit and determining reorder quantitiesb. Picking goods from the warehouse shelves and updating the inventory subsidiary ledgerc. Billing customers and posting the bills to the sales journald. Providing information on inventory levels and
What is a validity check?
What are the six broad classes of physical control activities defined by COSO?
What is skimming?
Define cash larceny.
Explain the purpose of the Public Company Accounting Oversight Board.
Define check tampering.
What is conflict of interest?
Name the general categories of IT application control tests that auditors design.
Describe the audit objectives and procedures related to systems development and program change procedure to ensure application integrity.
Describe the audit objectives and procedures related to automated audit trails that monitor users and events.
Which of the following statements about the ITF technique for testing is NOT correct?a. Applications may be tested directly without being removed from service.b. ITF supports continuous monitoring of controls.c. ITF has the potential to corrupt corporate data bases.d. During normal operations, test
Which of the following is NOT an SDLC control issue during an audit?a. User and computer services management properly authorized the project.b. A preliminary feasibility study showed that the project had merit.c. A cost-benefit analysis was conducted using reasonably accurate values.d. The detailed
Which of the following statements about the GAS techniques for substantive testing is NOT correct?a. GAS captures data during processing without removing the application from service.b. GAS languages are easy to use and require little IT background.c. GAS techniques are limited to use with flat
Why is reliance on the client IT staff to provide a copy of the production application a potential risk?
What is the importance of the SPL?
Which of the following is NOT a test for identifying application control errors?a. Access testsb. User acceptance testsc. Field testsd. Range testse. All of the above
Tracing is a technique thata. Reviews interest calculations to identify a salami fraud.b. Performs an electronic walk through of computed logic database.c. Allows test data to be merged with production data and traces the effects in the database.d. None of the above.
Which of the following statements is NOT correct?a. EAMs capture transactions during processing without removing the application from service.b. EAMs support continuous monitoring of controls.c. AMs have the potential to corrupt corporate data basesd. EAMs decrease operational performance.e.
What is the purpose of program testing in the SDLC?
Which of the following statements is NOT correct?a. Application logic changes may be made directly to the load module.b. As a practical matter, programs in their compiled state are secure and free from the threat of unauthorized modification.c. Executing a production application requires that the
Which of the following is NOT an SDLC controllable activity?a. External audit participationb. User specificationc. Systems authorizationd. User test and acceptance procedurese. All are SDLC controls
Which of the following statements about test data techniques for testing application controls are not correct?a. Implementing the test is costly and labor intensive.b. Applications may be tested directly without being removed from service.c. The test provides only a static picture of application
What is event monitoring?
Last year ACME Manufacturing commissioned Fly- By-Night Consulting (FBNC) to oversee the implementation of a new information system. Based on FBNC recommendations to establish an “open” environment with a more efficient workflow, the IT professionals at ACME have provided users with relatively
List the four general control areas.
Showing 4300 - 4400
of 5294
First
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
Last
Step by Step Answers