1. What are the investment, security, accessibility of computing? 2.What are data, and mobility benefits of cloud...
Question:
1. What are the investment, security, accessibility of computing?
2.What are data, and mobility benefits of cloud computing?
3. Why are firewalls placed between each tier of the integrated enterprise system?
4. Provide an example of how the integrated enterprise system technology permits data to flow through functional areas as it passes through the value chain.
5. What is the purpose of requiring a spreadsheet user log and change log?
6. What are the goals of a disaster recovery plan?
7. List and describe the three system development methodologies
. 8. What are the downside risks and upside risks in risk intelligence?
9. Discuss two potential drawbacks associated with off-the-shelf accounting solutions.
10. List and briefly discuss the four rules that help ensure database integrity.
11. Discuss four advantages of shadow data?
12. What is the difference between a relational database and a dimensional database?
13. Identify and discuss the two approaches to business intelligence.
14. Discuss the security concerns related to shadow data and business intelligence technologies.
15. How does COSO define Enterprise Risk Management?
16. Discuss the role of accounting professionals in the development of shadow data.
17. What is XBRL? How does it work? 18. How does sustainability accounting impact people?
19. What is the difference between bolt-on tagging and integrated tagging?
20. List and define the XBRL essentials.
21. What is the triple bottom line and what does it measure?
22. What is the purpose of a physical security framework? Provide examples of physical security.
23. Why is encryption important in securing accounting data?
24. Explain the Grandfather-Father-Son method of backing up data.
25. What are the disadvantages of configuring or customising a baseline accounting system?
26. What transactions are typically associated with employees? Please define each transaction.
27. Discuss how business sales processes differ for an online furniture retailer and a physical furniture store.
28. What are the advantages of an integrated enterprise system?
29. Why does an accounting system need to be integrated throughout an enterprise?
30. Identify and discuss the five challenges of cloud computing.
31. Discuss the role of accounting systems and business intelligence in assisting organizations to improve sustainability.
32. What were the predecessors of today's sophisticated intelligence tools used for data analysis?
33. Identify 3 tips for spreadsheet risk management.
34. List and define the five access control threats.
35. List the three fundamental principles of information security.
36. Discuss the differences between risk management and risk intelligence.
37. Identify and discuss the four risk response categories. Provide examples to support your answer.
38. What are the different phases of Systems Development Life Cycle (SDLC)?
39. How is SQL used in database queries?
40. What is REA model? What are the four rules for drawing REA diagrams?
Systems Analysis and Design
ISBN: 978-0133023442
9th edition
Authors: Kenneth E. Kendall, Julie E. Kendall