All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
New
Search
Search
Sign In
Register
study help
computer sciences
information systems
Questions and Answers of
Information systems
Why is it so important for you to protect yourself?
What are the two types of actions you can take to protect yourself?
Why is it so important for you to protect your information assets? Can you assume that your organization's MIS department will do it for you?
Discuss the differences between behavioral and computer-based actions that you should take?
You and a few of your classmates decided to become entrepreneurs. You came up with a great idea for a new mobile phone application that you think will make lots of money. Your business plan won
Your nursery sells various types and sizes of trees, bedding plants, vegetable plants, and shrubs. It also sells fertilizer and potting soil. Design a coding scheme for your nursery.
Match the following terms with their definitions TERM a. Data processing b. Source documents c. Turnaround documents d. Source data automation e. General ledger f. Subsidiary ledger g. Control
You recognize weaknesses in the existing system and believe a document flowchart would be beneficial in evaluating this client's internal control in preparing for your examination of the financial
a. Draw a system flowchart of the billing operations, commencing with the computer preparation of the meter reading forms and ending with the mailing of customer bills. b. Draw a system flowchart
Prepare a system flowchart of the process described.
Prepare a document flowchart to reflect how ANGIC Insurance Company processes its casualty claims.
a. Develop a context diagram and a level 0 DFD of the acquisition/payment system at Oriental Trading.b. Prepare a document flowchart to document the acquisition/payment system at Oriental Trading.
The BusyB Company wants to store data about employee skills. Each employee may possess one or more specific skills and several employees may have the same skill. Include the following facts in the
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several
Lexsteel, a manufacturer of steel furniture, has facilities throughout the United States. Problems with the accounts payable system have prompted Lexsteel's external auditor to recommend a detailed
Match the following terms with their definitions: Term 1. Vulnerability 2. Exploit 3. Authentication 4. Authorization 5. Demilitarized zone (DMZ) 6. Deep packet inspection 7. Router 8. Social
Install and run the latest version of the Microsoft Baseline Security Analyzer on your home computer or laptop. Write a report explaining the weaknesses identified by the tool and how to best correct
The chapter briefly discussed the following three common attacks against applications a. Buffer overflows b. SQL injection c. Cross-site scripting Required Research each of these three attacks and
Obtain a copy of COBIT (available at www.isaca.org) and read section DS5.Design a checklist for assessing each of the 11 detailed information security control objectives. The checklist should contain
From the viewpoint of the customer, what are the advantages and disadvantages to the opt-in versus the opt-out approaches to collecting personal information? From the viewpoint of the organization
Should organizations permit personal use of e-mail systems by employees during working hours?
Obtain a copy of COBIT (available at www.isaca.org) and read the control objectives that relate to encryption (DS5.8 and DS5.11). What are the essential control procedures that organizations should
Research the information rights management software that may be available for your computer. What are its capabilities for limiting access rights? Write a report of your findings. Optional: If you
RESEARCH the problem of identity theft and write a report that explains:Whether the problem of identity theft is increasing or decreasing. What kind of identity theft protection services or insurance
Match the following terms with their definitions:1. Business continuity plan (BCP)2. Completeness check3. Hash total4. Incremental daily backup5. Archive6. Field check7. Sign check8. Change control9.
Creating and testing check digits.a. Create a spreadsheet that will take as input a five-digit account number and calculate a check digit using this formula: (5 x left-most digit + 4 x next digit + 3
MonsterMed Inc. (MMI) is an online pharmaceutical firm. MMI has a small systems staff that designs and writes MMI's customized software. The data center is installed in the basement of its two-story
The use of some form of electronic "cash" that would provide the same kind of anonymity for e-commerce that cash provides for traditional physical business transactions has been discussed for a long
Give two specific examples of non-routine transactions that may occur in processing cash receipts and updating accounts receivable. Also specify the control procedures that should be in place to
For each of the following activities identify the data that must be entered by the employee performing that activity and list the appropriate data entry controls: a. Sales order entry clerk taking a
Figure 12-18 depicts the activities performed in the revenue cycle by the Newton Hardware Company. a. Identify at least 7 weaknesses in Newton Hardware's revenue cycle. Explain the resulting threat
Alden, Inc. has hired you to review its internal controls for the purchase, receipt, storage, and issuance of raw materials. You observed the following:• Raw materials, which consist mainly of
For each of the following activities, identify the data that must be entered by the employee performing that activity and list the appropriate data entry controls: a. Purchasing agent generating a
Some companies have eliminated the collection and reporting of detailed analyses on direct labor costs broken down by various activities. Instead, first-line supervisors are responsible for
Create the spreadsheet shown in Figure 14-11. Write formulas to calculate the total depreciation expense and to display the correct values in the following three columns: Age, Depreciation Rate, and
How would you respond to the treasurer of a small charity who tells you that the organization does not use a separate checking account for payroll because the benefits are not worth the extra monthly
The local community feels that secondary school education is a necessity in our society and that lack of education leads to a number of social problems. As a result, the local school board has
Use the data in Table 16-3 to create the following graphs:a. Sales b. Sales and Gross Margin c. Earnings per share d. Which principles of graph design, if any, did you have to manually implement to
a. Identify and discuss the basic factors of communication that must be considered in the presentation of the annual report. b. Discuss the communication problems a corporation faces in preparing the
a. Why should USAA collect data on which auto parts are fixed most frequently? What could it do with this data? b. Even though USAA offered to waive the deductible, the repair shops still managed to
a. What is an accounts receivable aging report? b. Why is an accounts receivable aging report needed for an audit? c. What is an accounts receivable aging report used for in normal company
a. What kind of information do you think Tesco gathers?b. How do you think Tesco has motivated over 12 million customers to sign up for its Clubcard program?c. What can Tesco accomplish with the
Design a chart of accounts for SDC. Explain how you structured the chart of accounts to meet the company's needs and operating characteristics. Keep total account code length to a minimum, while
After viewing the Web sites, and based on your reading of the chapter, write a 2 page paper that describes how an ERP can connect and integrate the revenue, expenditure, human resources/payroll, and
Identify whether the following transactions belong in a master file or a transaction file.a. Update customer address change b. Update unit pricing information c. Record daily sales d.
Prepare a context diagram and a Level 0 DFD for each of the following situations. a. Prepare and file a tax return with the tax owed to the Internal Revenue Service.b. A customer pays an invoice with
Prepare a program flowchart to help Melanie program this process.Melanie is doing a study on various weight-loss plans and needs to determine an individual's weight status by calculating his
Prepare a BPD that documents Beccan's business processes.As the internal auditor for No-Wear Products, you have been asked to document the company’s payroll processing system. Based on your
a. Identify three potential users and design a subschema for each. Justify your design by explaining why each user needs access to the subschema data elements. b. Use Microsoft Access or some other
1. How does Miller fit the profile of the average fraud perpetrator? 2. How does he differ? 3. How did these characteristics make him difficult to detect?
The CISO of the ABC company is considering how to increase the strength of employee passwords. Currently, passwords must be eight characters, they must be case-sensitive, and they must contain at
Given the following list of potential authentication credentials, identify as many combinations as possible that can be used to implement (a) a multi-modal authentication process and (b) a
At present, no Berwick employees have auditing experience. To staff its new internal audit function, Berwick could train some of its computer specialists in auditing, hire experienced auditors and
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats?a. A purchasing agent orders materials from a supplier that he partially owns.b.
Examine issues of the Journal of Accountancy, Strategic Finance, and other business magazines for the past three years to find stories about current developments in factory automation. Write a brief
Payroll has traditionally been an accounting function and some CPAs have provided payroll processing services to their clients. Today, CPAs are finding additional new lucrative opportunities to
Sparky's Amusement Park is an entertainment park run by recent college graduates. It caters to young people and others who are young at heart. The owners are very interested in applying what they
Examine Figure 1.1. Based on any work experience you have had, with which elements are you least comfortable? With which are you most comfortable? Discuss your answers.
Why has the Internet enabled an explosion in e-business when EDI has been available for decades?
One control that is applicable for almost any system is "enter data close to the originating source." A customer entering a purchase into a sales system (such as at Amazon.com) is an excellent
The two most widely used billing systems are (1) pre-billing systems and (2) post-billing systems. a. Discuss the conditions under which each of these billing systems is most appropriate. b. Discuss
Describe your personal bill paying process. What control plans do you have in place to meet the control goals in this chapter? Consider effectiveness, efficiency, security and information goals.
This chapter discusses both fraud and non-fraudulent losses in the AP/CD process. Describe any losses you have encountered in your personal bill paying process. Did you change any aspect of your
Product innovation includes designing innovative products and getting them to market quickly. In a world where the design, production, and consumption may be on different continents, describe how an
The Shark Company requests bids from vendors for specific configurations rather than bids for general performance objectives because it "knows what it needs." Discuss fully.
A seasoned systems employee was overheard saying, "As long as we plan a systems development project and carry out the project in an orderly manner, we don't need a formal, documented systems
How might a couple who enjoy purchasing virtual and digital goods together avoid property division issues in the event of a divorce?
To protect themselves, manufacturers have been forced to include lengthy safety warnings for their products. What is the downside of such behavior?
Why did ACS contend that Johnson was not its employee? Discuss
Joan, who is sixteen years old, moves out of her parents' home and signs a lone-year lease for an apartment at Kenwood Apartments. Joan's parents tell her that she can return to live with them at any
Café Rojo, Ltd., an Ecuadoran firm, agrees to sell coffee beans to Dark Roast Coffee Company, a U.S. firm. Dark Roast accepts the beans but refuses to pay. Café Rojo sues Dark Roast in
Wonder Corporation has an opportunity to buy stock in XL, Inc. The directors decide that, instead of Wonder buying the stock, the directors will buy it. Yvon, a Wonder shareholder, learns of the
Quintana Corporation sends important documents to Regal Nursery, Inc., via Speedy Messenger Service. While the documents are in Speedy's care, a third party causes an accident to Speedy's delivery
Bernie sells his house to Consuela under a warranty deed. Later, Delmira appears, holding a better title to the house than Consuela has. Delmira wants Consuela off the property. What can Consuela do?
Fidelity Corporation offers to hire Ron to replace Monica, who has given Fidelity a month's notice to quit. Fidelity gives Ron a week to decide whether to accept. Two days later, Monica signs an
Alyssa owes Don $5,000 and refuses to pay. Don obtains a garnishment order and serves it on Alyssa's employer. If the employer complies with the order and Alyssa stays on the job, is one order enough
What problems and challenges did Home Depot experience?
Describe the relationship among people, organization, and technology at Home Depot. How did this relationship change over time?
How much was Home Depot's management responsible for its problems? What about the role of technology and organizational factors?
Mark Holifield, Home Depot's Vice President of Supply Chain, has noted that the company didn't have the most leading-edge technology, but it could make a major change in its supply chain. Discuss the
How will a four-step method for business problem solving help you solve information system-related problems? a. List and describe each of the four steps for solving business problems. b. Give some
How will information systems affect business careers, and what information system skills and knowledge are essential?a. Describe the role of information systems in careers in accounting, finance,
What major features of a business are important for understanding the role of information systems?a. Define a business and describe the major business functions.b. Define business processes and
List and describe the technologies used in this case study.
How do the systems described in this case provide business intelligence?
How does predictive planting support decision making? Identify three decisions that you can support.
How helpful is predictive planting to individual farmers and the agricultural industry? Explain your answer.
Don's Lumber Company on the Hudson River features a large selection of materials for flooring, decks, moldings, windows, siding, and roofing. The prices of lumber and other building materials are
How do Porter's competitive forces model, the value chain model, synergies, core competencies, and network-based strategies help companies use information systems for competitive advantage? a. Define
In this exercise, you will use software at car-selling websites to find product information about a car of your choice and use that information to make an important purchase decision. You will also
Analyze Sears, using the competitive forces and value chain models.
What was the problem facing Sears? What people, organization, and technology factors contributed to this problem?
What solution did Sears select? What was the role of technology in this solution?
How effective was the solution Sears selected? Explain your answer.
How do information systems help businesses compete globally? a. Describe how globalization has increased opportunities for businesses. b. List and describe the four main ways of organizing a business
How do information systems help businesses compete using quality and design? a. Define quality and compare the producer and consumer definitions of quality. b. Describe the various ways in which
What is the role of business process management (BPM) in enhancing competitiveness?a. Define BPM and explain how it helps firms become more competitive.b. Distinguish between BPM and business process
In this project, you'll learn how to build a simple blog of your own design using the online blog creation software available at Blogger.com. Pick a sport, hobby, or topic of interest as the theme
How have information systems affected laws for establishing accountability and liability and the quality of everyday life? a. Explain why it is so difficult to hold software services liable for
InfoFree's website is linked to massive databases that consolidate personal data on millions of people. Users can purchase marketing lists of consumers broken down by location, age, income level,
Showing 1300 - 1400
of 1599
First
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16