All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
A destructive computer program masquerading as a legitimate one is called a ( __________ ) .(a) trapdoor(b) logic bomb(c) Trojan horse(d) worm
Five employees were accused of using their employer's mainframe computer during slack hours to operate their own data processing firm. This is an example of ( __________ ).(a) program alteration(b)
An alternate computer processing site that contains the necessary wiring and computer equipment for operation, but not data files, is called a ( __________ ).(a) hot site(b) cold site(c) flying-start
Marking and locking out a disk or DASD sector so that it will not be used again after it has been found to be unreliable is called ( __________ ).(a) hacking(b) flagging(c) disk shadowing(d) disk
A dormant piece of code placed in a computer program for later activation by a specific event is a ( __________ ).(a) trapdoor(b) logic bomb(c) Trojan horse(d) worm
Identify several unique problems and risks associated with computerized information networks.
What elements are included in a computer security system?
Does the development of a computer security system require application of the life-cycle approach? Discuss.
Identify some of the general types of threats that affect computer systems.
Is it possible to rigorously identify characteristics of the white-collar criminal?
What types of individuals pose a threat to a computer system?
Identify several different types of intruders.
Identify and discuss six different methods that an individual might use to perpetrate a computer fraud.
How might computer programs be used to commit acts of sabotage?
Describe the layered approach to access control. What specific layers of access control might be implemented?
Identify several recovery strategies and procedures that might be included in a disaster recovery plan.
The Randell Company is a medium-sized toy manufacturer. The information services division of this company is composed of user services, systems programming, and systems maintenance. In addition, the
Green Manufacturing maintains a large computer systems division. The company has recently faced a major problem with its software. It seems that ever since one of the computer programmers has been
A programmer in the Ace Bottle Company installs a patch in one of the computer's billing routines that skips over the billing of a friend's account. The program allows the account balance to increase
If customers pay for each sales transaction with a separate check and are not permitted to make installment payments on any sales, then the relationship between the Sales and Cash Receipt events
Why is it not necessary to model activities such as mailing invoices to customers and recording invoices received from suppliers as events in an REA diagram?
Develop a data model of Fred’s Train Shop’s expenditure cycle activities related to the acquisition of office equipment and other fixed assets. Assume that Fred makes installment payments for
Which of the following types of entities must become a separate table in a relational database?a. resourcesc. agentsb. eventsd. all of the above
Which type of relationship cardinality must be implemented in a relational database as a separate table?a. 1:1 relationshipc. M:N relationshipb. 1 :N relationshipd. all of the above
Combining two REA diagrams by merging entities common to both will necessitate changes in cardinality pairs associated with the merged entity if it is a(n)a. resourcec. agentb. eventd. all of the
Information traditionally found in journals is stored in which type of entity in an REA database?a. resourcec. agentb. eventd. all of the above
The primary key of a M;N relationship between the Receive Inventory and Cash Disbursement events would bea. receiving report numberb. check numberc. both receiving report number and check numberd.
In a relational database designed according to the REA data model, information traditionally stored in ledgers can be obtained by queryinga. resourcesc. agentsb. eventsd. all of the above
The ABC Company sells mass-produced items to retail stores on credit. At the beginning of each month, ABC sends each customer a monthly statement that lists all sales transactions for the previous
Describe the different types of electronic networks and contrast the differences between them.
Summarize the development of the Internet.
Explain the security risks inherent in any intranet.
Explain how addressing works on the Internet.
Summarize any differences between firewalls and proxy servers. In what situations would both be used?
How might EDI (electronic data interchange) be implemented on a commerce server?
Define and describe several different types of servers used in electronic commerce.
Discuss one or two different types of hacker attacks that might be made against a commerce server.
If two companies did electronic business with each other on a regular basis, would they need to exchange digital certificates with each new transaction? Why or why not?
Summarize any advantages of public-key encryption over secret-key encryption.
What would a hacker have to do to forge a digital signature? How can such an attack be prevented?
Why do message digests normally have a fixed length?
Why might the message digesting function be the target of an attack for a hacker?
Discuss the relative advantages and disadvantages of digital signatures versus traditional signatures.
What security issues might exist in maintaining a certificate revocation list?
Tireco is a medium-sized firm that manufactures and distributes specialty tires. The company has good separation of duties, and at the top of the organization chart is the president, controller, vice
All clear Company is a large manufacturer of custom draperies. In all, the company has seven divisions spread out across the country. Furthermore, the company has adopted a policy of issuing digital
Given the information in the previous question, analyze and criticize the information that is issued with the purchasing officer's credentials.Question 20All clear Company is a large manufacturer of
GGG Company has entered into a contract with its financial institution that would allow it to issue its own digital cash. GGG would create sequenced notes that would be digitally signed with one of
What is the binary (base 2 ) representation of the following base 10 (decimal) values?(a) 7(b) 13(c) 28(d) 71(e) 93(f) 428
Compute the decimal (base 10) equivalents of the following binary (base 2 ) numbers:(a) 111000(b) 101010(c) 100111
Discuss whether or not computer output microfilming (COM) would be appropriate in the following situations:(a) filing name and address changes on a customer mailing list.(b) storing canceled checks
A disk has 200 cylinders. There are ten recording surfaces per disk pack and each track can hold 7,200 bytes.(a) What is the maximum capacity of each cylinder? Of the entire disk pack?(b) Assume that
Surveys have indicated that about \(60 \%\) of all computer-related fraud in the government might be attributed to the input of fraudulent data for computer processing. What does this suggest
Inventory records will be stored on magnetic tape. The tapes that will be used are 2,400 feet long with a density of 1,600 bytes per inch. The interblock gap is \(0.6 \mathrm{inch}\). The inventory
Which method of input would you recommend for the following activities? Explain your choice.(a) entering grades for courses(b) entering data from bank checks(c) entering data for payroll
Distinguish between a mainframe computer, a minicomputer, and a PC. Do you think minicomputers are obsolete? Explain your answer.
Operating systems such as OS/2 and Windows have caused terms such as multitasking, multiuser, and concurrent processing to be applied to PCs. Explain what these capabilities provide to PC users.
Take a field trip to a computer store and evaluate several PC systems that are sold there. Prepare a report comparing the key features and prices of several of the systems. Include such
Take a field trip to a computer store and evaluate several business-oriented PC software packages that are sold there, such as spreadsheet software and database software. Prepare a report comparing
Take a field trip to the central computer facility at your university. Diagram the hardware configuration of the university's computer system. Include such items as the number of CPUs, disk drive
Prepare a hardware configuration diagram for each of the following computer systems.(a) A PC system used by an accountant to prepare tax returns and other types of financial reports. The system has a
Ibex Insurance Corporation has over 2,000 PCs networked locally in its regional offices that are connected over leased telephone lines to mainframe computers in the company's central offices. Ibex
The universal product code (bar code) that is commonplace on consumer products is a ( ___________ ) .(a) sequential code(b) block code(c) group or hierarchical code(d) decimal code
A journal is ( ___________ ).(a) a chronological listing of transactions(b) similar to a transaction file(c) similar to a reference file(d) a and b
Payroll tax tables would be found in \(a(n)(\) ( ___________ ) file.(a) master(b) open data(c) reference(d) transaction
Which type of file has only temporary significance to management?(a) master(b) open data(c) reference(d) transaction
What sequence of events is pertinent in designing an accounting information system?(a) design inputs, processes, and then outputs(b) design chart of accounts, inputs, and then processes(c) design
Which type of coding scheme allows for the most flexibility?(a) block(b) sequence(c) group(d) decimal
Many data processing systems standardize calendar dating procedures by assigning sequential numbers to dates. This procedure is known as ( ___________ ).(a) decimal dating(b) Julian dating(c)
The fundamental consideration(s) in forms design is (are) ( ___________ ).(a) prenumbering, forms control sequence numbers, revision codes, spacing, color, and data layout(b) the number of times a
Standard journal entries are used to ( ___________ ).(a) document the plan of journalizing recurring transactions(b) document the chart of accounts(c) eliminate the need for adjusting entries(d)
A writing board system is used to prepare checks for the payment of invoices. The one-writing operation prepares the check and ( ___________ ) .(a) posts the transaction(b) journalizes the
Which of the following best describes the Internet?(a) developed by Microsoft and IBM(b) highly centralized(c) highly decentralized(d) none of the above
Which of the following is true?(a) The Internet is faster than most local area networks.(b) Most metropolitan networks are faster than the Internet.(c) The speed of the Internet is usually critical
TCP/IP is ( __________ ) .(a) an approach to networking developed by the RAND Corporation(b) the standard for virtually all long-distance Internet communications(c) the standard protocol for the
Spoofing would be most applicable to ( __________ )(a) a hacker attack(b) a failure in a proxy server(c) the elimination of an access control list(d) none of the above
An FTP server is an example of a ( __________ ).(a) Web server(b) mail server(c) commerce server(d) none of the above
The SET protocol would be most applicable to ( __________ ).(a) a commerce server(b) a Web server(c) a mail server(d) an FTP server
Which approach to encryption is the most secure for a server that deals with many unknown clients?(a) public-key encryption(b) secret-key encryption(c) anonymous encryption(d) none of the above
Which of the following statements is true regarding digital signatures?(a) They require the related message to be encrypted(b) They do not require the related message to be encrypted(c) They require
Encryption keys should be created and distributed at the ( __________ )(a) workstation level(b) department level(c) organization level(d) security office level
Which of the following is used to store digital cash on a personal computer?(a) electronic digest(b) digital-signing unit(c) virtual cash transporting system(d) none of the above
Preparing performance reports that contain data only about items that a specific organizational unit controls is an example of which of the following?a. flexible budget systemc. closing the booksb.
What is the business intelligence technique designed to discover non hypothesized relationships called?a. data warehousingc. data miningb. OLAPd. querying
Which of the following shows the implied linkages among the portions of the balanced scorecard? a. Financial Internal Innovation and learning Customer b. Innovation and learning Internal Customer
Writing a query to identify trends in sales of a product by salesperson and by customer over the past
years is an example of which of the following?a. data miningc. transaction processingb. responsibility accountingd. OLAP
Measures of cycle time would most likely appear in which part of the balanced scorecard?a. innovation and learningc. internal operationsb. customerd. financial
Which of the following is an important part of the audit trail?a. journal vouchersc. trial balanceb. flexible budgetsd. data warehouse
What is the new common business reporting computer language developed, in part, by the accounting profession called?a. XMLc. SQLb. XBRLd. HTML
How is XBRL-GL likely to affect the role of accountants in organizations?
Compare and contrast how auditors can use OLAP and data mining techniques to evaluate internal controls.
Some companies are abandoning the practice of budgeting because they claim that the costs outweigh the benefits. They argue that instead of comparing actual performance to budgeted standards, closely
Which control procedure would be most effective in addressing the following problems?a. When entering a journal entry to record issuance of new debt, the treasurer inadvertently transposes two digits
An important control procedure involves the periodic reconciliation of general ledger accounts with their subsidiary ledgers. Explain how this control procedure works in the context of accounts
Figure 14-1 is a context diagram for the general ledger and reporting cycle that shows the principal data flows to and from the general ledger.Requireda. List the source documents or journals
Refer to the example of responsibility coding depicted in Figure 14-4.Requireda. Design a coding scheme that will support the production of this set of reports. Make and state any assumptions you
Objective; Practice graph design principles Required Create bar graphs for each of the following data sets. Follow the principles for graph design presented in the chapter, or explain which rule(s)
Objective: Create pivot tables for what-if analysis Required Read the article “Make Excel an Instant Know-It-All” by Roberta Ann Jones in the March 2004 issue of the Journal of Accountancy. (You
Objective: How to do what-if analysis with graphs Requireda. Read the article “Tweaking the Numbers,” by Theo Callahan in the June 2001 issue of the Journal of Accountancy. (You can find the
Showing 900 - 1000
of 4277
First
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Last