New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
accounting information systems
Accounting Information Systems 14th Global Edition Marshall B. Romney, Paul John Steinbart - Solutions
What pressures motivated Miller to embezzle? How did Miller rationalize his actions?
Explain the three elements of the Opportunity Triangle (commit, conceal, convert), and discuss how Miller accomplished each when embezzling funds from Associated Communications. What specific concealment techniques did Miller use?
How does Miller fit the profile of the average fraud perpetrator? How does he differ? How did these characteristics make him difficult to detect?
Which of the following statements is (are) TRUE?a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data fraud.b. The type of computer fraud that is the most difficult because it requires the most skill is computer instructions fraud.c. The
A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying a premium to the check’s value. He then scanned the check and used a variety of software packages
Cyber sleuths need which of the following skills?a. Ability to do complex programming, so they can develop their own software to examine corporate data and recordsb. Ability to follow a trail, think analytically, and be thoroughc. Ability to use their computer engineering experience to evaluate the
The number of incidents and the total dollar losses from computer fraud are increasing rapidly for which of the following reasons?a. Many instances of computer fraud go undetected and many computer frauds are not reported.b. Many companies are moving to cloud services where there are few data
Which of the following statements is (are) TRUE?a. Perpetrators who do not steal cash or use the stolen assets usually convert the assets to a spendable form.b. The biggest fraud opportunity arises from a company’s failure to design and enforce its internal control system.c. A huge fraud
Which of the following statements is (are) TRUE?a. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets.b. Committing a fraud almost always takes more effort and time than concealing it.c. Perpetrators can hide an asset theft by charging the
Which of the following statements is (are) TRUE about computer fraud perpetrators?a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining stature in the hacking community.b. They do not see themselves as criminals and rarely, if ever, seek to
SAS No. 99 requires auditors to .a. understand fraud and why it is committedb. limit discussion among audit team members of how and where the company’s financial statements have been susceptible to fraud in prior years, due to confidentiality concernsc. identify, assess, and respond to risks by
Which of the following actions did the Treadway Commission recommend to reduce fraudulent financial reporting?a. Establish financial incentives that promote integrity in the financial reporting process.b. Identify and understand the factors that lead to fraudulent financial reporting.c. Assess the
In a typical misappropriation, the perpetrator .a. gains the trust or confidence of the entity being defraudedb. uses trickery, cunning, or false or misleading information to commit fraudc. does not make an attempts to conceal the fraudd. terminates the fraud as soon as the desired amount of money
Why do fraudulent acts often go unreported and are therefore not prosecuted?
A bank auditor met with the senior operations manager to discuss a customer’s complaint that an auto loan payment was not credited on time. The customer said the payment was made on May 5, its due date, at a teller’s window using a check drawn on an account in the bank. On May 10, when the
An insurance company in Asia reported a profit of $100 million for the financial year 2015–16 through the news-dissemination system of the stock exchange where it was listed. Its stock price increased several times as the announced profit was 10 times more than the previous year’s profit. A few
For each of the following independent cases of employee fraud, recommend how to prevent similar problems in the future.a. Some customers found that the products of a prestigious brand sold at retail shops in China are counterfeits. This explains why the customers prefer to buy those products in the
Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial reporting. Fraud prevention and detection require that pressures and opportunities be identified
The computer frauds that are publicly revealed represent only the tip of the iceberg.Although many people perceive that the major threat to computer security is external, the more dangerous threats come from insiders. Management must recognize these problems and develop and enforce security
A client heard through its hotline that John, the purchases journal clerk, periodically enters fictitious acquisitions. After John creates a fictitious purchase, he notifies Alice, the accounts payable ledger clerk, so she can enter them in her ledger. When the payables are processed, the payment
You were asked to investigate extremely high, unexplained merchandise shortages at a department store chain. You found the following:a. The receiving department supervisor owns and operates a boutique carrying many of the same labels as the chain store. The general manager is unaware of the
Why is computer fraud on the rise, and why is it often much more difficult to detect than other types of fraud? How does the U.S. Justice Department define computer fraud?
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan. The teller appeared to process the payment, but told the customer the printer was jammed can’t print a receipt. The customer accepted the excuse and drove away. The teller pocketed the cash and
Do you agree that high penalty, such as reducing salaries or retirement benefits, is the most effective way to reduce employee fraud because the cost of dishonesty is excessive?
Which of the following control procedures is most likely to deter lapping?a. encryptionb. continual update of the access control matrixc. background check on employeesd. periodic rotation of duties
How vulnerable is the company’s computer system to fraud?
How can the company detect and prevent fraud?
Why did the company not catch these mistakes? Was there a breakdown in controls?
How was the fraud perpetrated? What motivated Don to commit it?
What constitutes a fraud, and is the withholding problem a fraud?
Explain how to prevent and detect computer fraud and abuse.
Define computer fraud and discuss the different computer fraud classifications.
Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds.
Define fraud and describe both the different types of fraud and the auditor’s responsibility to detect fraud.
Explain the threats faced by modern information systems.
What are the relative strengths and weaknesses of the different types (relational versus other logical models) of DBMSs?
Which DBMS products are based on a logical model other than the relational data model?
Which popular DBMS products are based on the relational data model?
With respect to relational databases, which of the following statement(s) is (are) true?a. A foreign key is only found in one table; it is not allowed to be in another table.b. When data about objects of interest are stored in separate database tables, it is easier to avoid insert anomalies.c.
With respect to relational databases, which of the following statement(s) is (are) true?a. The referential integrity rule ensures that there are no update anomaly problems with the foreign keys.b. A delete anomaly occurs when deleting a row has unintended consequences.c. Each relational table row
With respect to database systems, which of the following statement(s) is (are) true?a. A subschema can prevent access to those portions of the database that do not apply to it.b. A report writer is a high-level, English-like language with powerful, easy-to-use commands to help sort, order, and
With respect to database systems, which of the following statement(s) is (are) true?a. A record layout shows the items stored in a file, including the type of data stored and both the order and length of the data fields.b. The physical view of data is how people conceptually organize and understand
With respect to databases and files, which of the following statement(s) is (are) true?a. There is a record in the data dictionary that describes each file in the database.b. The DQL is used to change the database, such as creating, deleting, and updating records.c. A schema describes data elements
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. The database controller (DBC) is responsible for coordinating, controlling, and managing the database.b. Since strategic decision making requires access to large amounts of historical data,
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. Cross-functional analysis refers to combining master files into larger pools of data so more application programs can access the data.b. In the master file approach, data is an organizational
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. A problem with databases is data inconsistencies, as the same data is stored in two or more master files.b. A database system consists of the database, the DBMS, and the application programs
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. Analyzing large amounts of data for strategic decision making is often referred to as strategic processing.b. Databases were developed to address the proliferation of master files, which were
Use the database depicted in Table 4-19 to answer the questions that follow.a. What is Date best described as?b. How many primary keys are there in this database?c. How many foreign keys are there in this database?d. What is Item # best described as?e. What is Unit Price best described as?f. In the
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several different invoices. You want to store the following information:amount applied to a specific invoice
C&A Company wants to store employee skill data. Each employee may possess one or more skills, and several employees may have the same skill. Include the following facts in the database:date hired date of birth skill acquisition date REQUIREDa. Design a set of relational tables to store these
Retrieve the S&S In-Chapter Database (in Microsoft Access format) from the text’s website (or create the tables in Table 4-5 in a relational DBMS product). Write queries to answer the following questions. Note: For some questions, you may have to create two queries—one to calculate an Invoice
Most DBMS packages contain data definition, data manipulation, and data query languages. For each of the following, indicate which language would be used and why.a. A database administrator defines the logical structure of the database.b. The controller requests a cost accounting report containing
Describe what a tuple in a database is. What does it consist of, and what function does it have in a database?DISCUSSION QUESTIONS
List the four DBMS “languages” and describe who uses each and for what purpose.Discuss the ways in which a well-designed DBMS facilitates the three basic functions of creating, changing, and querying data.
Cornelia Cassidy is a telecom equipment sales representative. Her company has provided her with a laptop computer that uses wireless connectivity to access the accounting information system from virtually anywhere in the country. Cornelia and other sales reps have access to view customer and
Which of the following is not a basic requirement of a relational database?a. Primary keys cannot be null.b. Every column in a row must be single.c. Foreign keys cannot be null.d. All non-key attributes in a table must describe a characteristic of the object identified by the primary key.
Which of the following would managers most likely use to retrieve information about sales during the month of October?a. DMLb. DSLc. DDLd. DQL
The internal-level schema of a database system that consists of an individual user’s view of portions of a database is also called a subschema.a. Trueb. False
What is each row in a relational database table called?a. relationb. attributec. anomalyd. tuple
How do you query a relational database system?
How do you design a well-structured set of tables in a relational database?
What is a relational database system?
What is a database system, and how does it differ from file-oriented systems?
Describe what a relational database is, how it organizes data, and how to create a set of well-structured relational database tables.
Explain database systems, including logical and physical views, schemas, the data dictionary, and DBMS languages.
Explain the importance and advantages of databases, as well as the difference between database systems and file-based legacy systems.
Use the flowchart below to answer the questions that follow.REQUIREDa. What is the correct label for Shape 1 in the flowchart?b. What is the correct label for Shape 2 in the flowchart?c. What is the correct label for Shape 3 in the flowchart?d. What should be the correct shape for the triangle
Melanie is doing a study on various weight-loss plans and needs to determine an individual’s weight status by calculating his or her body mass index. To calculate a person’s body mass index, height must be measured in meters and weight measured in kilograms. The index is calculated by dividing
The local college requires that each student complete an online registration request form. The system checks the accounts receivable subsystem to ensure that no fees are owed. Next, for each course, the system checks the student transcript to ensure that he or she has completed the course
Ashton Fleming has asked you to document the cash receipts system at S&S. Ashton’s narrative of the system follows:Customer payments include cash received at the time of purchase and payments received in the mail. At day’s end, the treasurer endorses all checks and prepares a deposit slip for
Ashton Fleming has decided to document and analyze the accounts payable process at S&S so the transition to a computerized system will be easier. He also hopes to improve any weaknesses he discovers in the system. In the following narrative, Ashton explains what happens at S&S:Before S&S pays a
As the internal auditor for No-Wear Products, you have been asked to document the company’s payroll processing system. Based on your documentation, No-Wear hopes to develop a plan for revising the current system to eliminate unnecessary delays in paycheck processing. The head payroll clerk
Beccan Company is a discount tire dealer operating 25 retail stores in a large metropolitan area. The company purchases all tires and related supplies using the company’s central purchasing department to optimize quantity discounts. The tires and supplies are received at the central warehouse and
Terrell and Monique Anderson run an antique store in their hometown of Verona, Italy.To find items to sell in their shop, they travel around Europe and Asia, buying unique artifacts. Within an hour of making a purchase, they use their smartphone to take a picture of the item and post a short tweet
At the Barsus steel factory, employees have to enter their working hours on data input terminals and the job code for each project they work on. They enter the starting time and the time they stop working on each project. The international head office of Barsus receives the job-time data
Prepare flowcharting segments for each of the following operations:a. Processing transactions stored on a sequential medium such as a magnetic tape to update a master file stored on magnetic tapeb. Processing transactions stored on magnetic tape to update a databasec. Querying a database and
Identify five important guidelines for drawing a flowchart. Which one would be the most important guideline to consider when preparing a flowchart? Support your choice with an example.
Give two reasons why it is important to have a working knowledge of DFDs and flowcharting. Explain your answer.
Discuss the ways in which information professionals interact with documentation tools and the various levels of understanding.
Identify the DFD from the following narrative: Henk buys a new bicycle at a local shop and pays with his debit card. The sales clerk enters the transaction in the cash register.At the time of closing, the sales clerk gives the register tape and the debit card PIN tape to his manager.
Which of the following statements is FALSE?a. A flowchart is an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner.b. Flowcharts use a standard set of symbols to describe pictorially the flow of documents and data through a system.c.
Prepare and use business process diagrams to understand, evaluate, and document information systems.
Prepare and use flowcharts to understand, evaluate, and document information systems.
Prepare and use data flow diagrams to understand, evaluate, and document information systems.
Which of the following statements is (are) true?a. An audit trail is a transaction path through a data processing system from point of origin to final output, but not backward from final output to point of origin.b. The need for reports should be periodically assessed, because they are often
Which of the following statements is (are) true?a. Transaction data are almost always recorded in a ledger before they are entered into a journal.b. Documents are records of transaction or other company data that can be printed out or stored as electronic images in a computer.c. ERP systems are not
Which of the following statements is (are) true?a. A chart of accounts facilitates preparing financial statements because data stored in individual accounts can easily be summed for presentation.b. A database query can provide the information needed to deal with problems and questions that need
Which of the following statements is (are) true?a. To ensure credit sales policies are followed, the system can be programmed to check a customer’s credit limit and payment history.b. A transaction file contains records of individual business transactions and is similar to a general ledger in a
Which of the following statements is (are) true?a. Input controls are improved by using pre-numbered source documents or by the system automatically assigning a sequential number to each transaction.b. With mnemonic codes, blocks of numbers are reserved for specific categories of data.c. As ERP
Which of the following statements is (are) true?a. Online batch processing is where transaction data are entered, edited, and processed as they occur.b. ERP implementation costs for large companies with multiple sites are usually about half the cost of the ERP user license.c. Well-designed
Which of the following statements is (are) true?a. Using source data automation or well-designed turnaround documents and data entry screens helps ensure captured data are accurate and complete.b. If the sum of all subsidiary ledger account balances does not equal its general ledger control account
Which of the following statements is (are) true?a. Source data automation devices capture transaction data in paper form at the time and place of their origin.b. General ledgers are often used for accounts receivable, inventory, fixed assets, and accounts payable.c. Master files are permanent and
Which of the following statements is (are) true?a. The data capture or input process is usually triggered by a top management decision.b. With sequence codes, items are numbered consecutively to account for all items, and missing items cause a gap in the numerical sequence.c. Cumulative accounting
Which of the following statements is (are) true?a. Turnaround documents are company output sent to an external party and returned as an input document.b. Data is one of a company’s most important resources but, to function properly, most organizations do not have to have the data readily and
You were hired to assist Ashton Fleming in designing an accounting system for S&S.Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see Table 2-4). He asks you to complete the following tasks:a. Specify what data you think should be collected on
Which of the following actions update a master file and which would be stored as a record in a transaction file?a. Update customer address changeb. Update unit pricing informationc. Record daily salesd. Record payroll checkse. Change employee pay ratesf. Record production variances g. Record sales
On their websites, you will find several online demonstrations for the SAP and Oracle ERP systems. Visit these websites and explore their content by doing the following:a. Search the SAP site for corporate videos, and watch two of them. Explore the industries, services, solutions, and platforms
An audit trail enables a person to trace a source document to its ultimate effect on the financial statements or work back from financial statement amounts to source documents. Describe in detail the audit trail for the following:a. Purchases of inventoryb. Sales of inventoryc. Employee payroll
Ollie Mace is the controller of SDC, an automotive parts manufacturing firm. Its four major operating divisions are heat treating, extruding, small parts stamping, and machining. Last year’s sales from each division ranged from $150,000 to $3 million. Each division is physically and managerially
The chart of accounts must be tailored to an organization’s specific needs. Discuss how the chart of accounts for the following organizations would differ from the one presented for S&S in Table 2-2.a. universityb. bankc. government unit (city or state)d. manufacturing companye. expansion of S&S
Showing 500 - 600
of 5294
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last
Step by Step Answers